Process Controls Reports

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

Oracle Database Vault
sponsored by Oracle Corporation
WHITE PAPER: Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
Posted: 15 Jul 2008 | Published: 01 Jun 2007

Oracle Corporation

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security

Overcoming the Challenges of Green Procurement through eProcurement
sponsored by Dimension Data Global
WHITE PAPER: This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program.
Posted: 30 Sep 2008 | Published: 26 Sep 2008

Dimension Data Global

Internal Controls Checklist for Corporate Data Protection and Compliance
sponsored by TechTarget Security
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 11 May 2011 | Published: 09 May 2011

TechTarget Security

Internal controls checklist for corporate data protection, compliance
sponsored by Novell, Inc.
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 20 May 2011 | Published: 20 May 2011

Novell, Inc.

Case Study: Auto Trader UK cuts IT resource use through Google Cloud, Kubernetes and Istio adoption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Auto Trader is the UK's biggest online marketplace for new and used car sales. Its head of infrastructure sets out how cloud, containers and microservices will help reinforce its market-leading position in the years to come
Posted: 08 Feb 2021 | Published: 09 May 2019

TechTarget ComputerWeekly.com

Overcoming Data Challenges for Innovation in Financial Services through 360-degree Business Solutions from InterSystems
sponsored by InterSystems
ANALYST REPORT: Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.
Posted: 26 Feb 2024 | Published: 26 Feb 2024

InterSystems

The Future of Financial Services: Part 2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 08 Feb 2021 | Published: 11 Feb 2019

TechTarget ComputerWeekly.com