Legal

Patent wars, regulation and legislation increasingly matter to the tech sector. Make sure you are up to date with the latest developments using our vendor white papers and case studies.

  • Webcasts // May 2014

    Webinar: A New Way to Work (Mobile)

    Mobile devices are everywhere, and every employee in your enterprise has one. In order to give employees access to the information they need, your apps must work collaboratively, on the go, and in real-time. Watch this webinar for an overview of Workday's current offerings for mobile HR and finance applications.

    Sponsored By Workday

  • Videos // May 2014

    The Future of Finance is Now

    Mark Nittler, vice president of enterprise strategy at Workday, explains how legacy finance systems can't keep up with the needs of today's enterprise. You’ll learn how the next generation of financial management focuses on speed, agility, cost, and insights—all delivered in the cloud.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Taking Measure of Talent

    As business models change, the pressure to leverage the true value of your human capital and better understand your talent management grows. This Harvard Business Review Analytic Services whitepaper, sponsored by Workday, focuses on effective management of your human capital and using technology to gain insight into your workforce.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: The Future of Finance is Now

    One of the biggest challenges finance organizations face today is that their systems are old and increasingly irrelevant. They simply cannot handle current business needs. Read the whitepaper to see how Workday addresses four major areas of weakness in such legacy financial management systems: speed, agility, cost, and insight.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Cloud Computing - A Silver Bullet for Finance?

    The benefits of cloud computing—a high return on investment, greater staff efficiencies, optimization of IT resources, and enhanced visibility and access to information—have piqued the interest of finance leaders. Read the whitepaper to discover the benefits of moving finance operations to the cloud.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Changing Times, Changing Business: Why Finance Management is Moving to Cloud

    A new study from Saugatuck Technology shows 51% of finance and IT executives feel their existing systems limit their ability to reach strategic goals. The culprits? No flexibility, siloed systems, poor access to information, and the high cost of maintenance. Read the report for the fascinating conclusions from the study.

    Sponsored By Workday

  • eBooks // Mar 2014

    eBook: The CFO's Guide to Big Data

    Big data can be confusing. Especially when it comes to finance. But, it can also give you a huge competitive advantage. Read the eBook to get clear-cut answers on what big data really is and why it should be so important to you and your finance organization.

    Sponsored By Workday

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Aug 2014

    Frost & Sullivan awards IBM 2014 Customer Value Leadership Award for Mobile Identity and Access Management Solution

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance.

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Cost of Data Breach Study, From Ponemon Institute, Sponsored by IBM

    IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM: Redefining Enterprise Systems

    Charles King positioning power understanding how cloud, analytics and security are at the centre of the conversation of infrastructure transformation.

    Sponsored By IBM

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Apr 2014

    Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

    Sponsored By F5

  • White Papers // Mar 2015

    Aberdeen Checklist - How B2B Salespeople Learn to Love Their Data

    In a recent study, Aberdeen provided a data and performance-driven bridge between two unlikely enterprise business partners: Sales Leadership and the IT team. The common ground here is sales analytics, or the business intelligence tools that leader companies more effectively leverage to support better sales forecasting, deal-making, and closing activities...

    Sponsored By QlikTech

  • White Papers // Oct 2013

    Consolidation: The Foundation for IT and Business Transformation

    Your enterprise needs the ability to identify all duplicative or outmoded IT and business applications, services, and other resources, and then to consolidate those worth keeping, migrate those worth updating, retiring the rest. With the right practices, policies, and technology platform, your enterprise can accomplish these goals in ways that...

    Sponsored By ServiceNow

  • White Papers // Mar 2014

    Leverage Security Intelligence for Financial Services Institutions

    IBM QRadar Security Intelligence Platform integrates SIEM, log management, risk management and network behavior analytics into a total security intelligence solution to provide the deep network visibility - and added security - that financial organizations require.

    Sponsored By IBM

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • White Papers // Mar 2014

    Leverage Security Intelligence for Retail

    IBM QRadar Security Intelligence Platform can serve as the foundation of retail organizations’ network defense capabilities, helping to guard against an expanding population of attackers seeking everything from credit card data to intellectual property to customer shopping behaviors.

    Sponsored By IBM

  • White Papers // Aug 2013

    Controlling and Managing Superuser Access

    Every business needs privileged account users. Unfortunately, most operating systems offer all-or-nothing solutions. This white paper explores the risks associated with privileged accounts, and explains how Dell solutions can mitigate those risks. Download the white paper today to learn more.

    Provided By Dell Software

  • White Papers // Jul 2014

    Compensation Made Simple

    Using market-based salary data to align your organization’s compensation strategy with those in the same recruiting market can enable your organization to stay competitive and improve employee engagement and retention. Read this paper to learn more about: How a business's lifecycle influences employee compensation, Why market-based salary data...

    Provided By IBM

  • White Papers // Mar 2014

    Empowering Modern Finance - The CFO as Technology Evangelist

    The CFO as Technology Evangelist is a research report commissioned by Oracle and Accenture, in collaboration with Longitude Research, that explores how modern CFOs and finance executives are adopting emerging technologies within their finance functions to enable the development of new capabilities and to transform the role of finance.

    Provided By Oracle

  • White Papers // Jun 2014

    Transforming Customer Experience in the New Digital World

    In today’s world, new digital communications channels are being continuously introduced. Customers are quickly adopting these new channels – including web, social and mobile – and want to use them to contact the companies with whom they do business. This white paper will show you how taking a holistic...

    Provided By Genesys Telecommunications Laboratories

  • White Papers // Jul 2011

    Balancing Profitability and Risk in Banking: Overcoming Common Risk Analysis and Reporting Challenges

    Banks need a robust enterprise risk analysis and reporting solution to improve reporting accuracy and efficiency while reducing the costs and burdens of compliance. This paper will focus on the many risk reporting challenges facing banks. It will then outline the best practices banks need to improve reporting and manage...

    Provided By SAP

  • White Papers // Feb 2009

    Best Practices for Data Archiving

    Corporations depend on the flow of information to conduct their business. From accounting to production to marketing to personnel, the information procured, generated, organized, and stored by an organization represents a significant portion of the output of its workforce. Protecting that information from unexpected disasters is not only prudent, in...

    Provided By CA

  • White Papers // Mar 2014

    Oracle Fusion Financials Cloud Service

    Modern organizations are under intense pressure to provide accurate, reliable, and speedy financial information to business decision-makers. Furthermore, complying with global standards has become more of a headache than ever before. How do you know if financial management in the cloud is right for you? This data sheet takes an...

    Provided By Oracle

  • White Papers // Jun 2014

    The Future of Work: Exceed Customer Expectations with Workload Management

    Customers expect a great end-to-end experience, whether work is accomplished in the enterprise or in the back office, it's all part of the Customer Service Value Chain. Is your enterprise meeting this expectation? What about in the future? In this white paper, Genesys outlines its vision for The Future of...

    Provided By Genesys Telecommunications Laboratories

  • White Papers // Aug 2007

    PCI DSS and HIPAA: The Security Standards Share Common Ground

    One of the greatest challenges that the electronic transactions industry faces today is the issue of security requirements under various rules and regulations. For most people in the industry, the issue is focused on the specifics of the Payment Card Industry Data Security Standard (PCI DSS), but the issue may...

    Provided By CSRSI

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Provided By IBM

  • White Papers // May 2014

    Chartis - The Risk Enabled Enterprise - Global Survey Results and Two-year Research Agenda

    This two year research initiative in collaboration with IBM focuses on key trends, best practices, challenges, and priorities in enterprise risk management and covers topics as diverse as culture, organizational structure, data, systems, and processes.

    Provided By IBM

  • White Papers // Jul 2014

    Pay for Performance...Are You Ready?

    This white paper discussed the elements that comprise a pay-for-performance system and how compensation professionals can effectively implement one. Download your copy of the white paper to learn more about: Pay for performance vs. increase for performance Cost of labor vs. cost of living Differentially rewarding

    Provided By IBM

  • White Papers // Mar 2009

    Addressing Compliance Initiatives With Tripwire and the Center for Internet Security (CIS)

    In this paper, discover what you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. This whitepaper looks at: What the CIS is and how it develops its benchmarks How to use the benchmarks to address compliance and security Some considerations...

    Provided By Tripwire

  • White Papers // Jun 2009

    Dynamic Data Center Compliance With Tripwire and Microsoft

    Compliance is a reality, but IT Operations does not need to become a security expert to monitor the health of their IT infrastructure in real-time. With the Tripwire Compliance Management Pack for System Center, users gain a central, end-to-end solution for monitoring the health and performance of their virtual and...

    Provided By Tripwire

  • White Papers // Jul 2009

    Sustaining SOX Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs

    To successfully sustain SOX compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Management must be more accountable and aware of the need for a continuous and proactive operational risk management environment that recognizes the...

    Provided By Tripwire

  • White Papers // Mar 2009

    The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

    The Health Insurance Portability and Accountability Act of 1996, or HIPAA, was enacted to safeguard Protected Health Information (PHI) by mandating procedures and controls to assure the public that critical and private information is controlled from loss of confidentiality, integrity or availability. With few exceptions, an organization is subject to...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    SOX, GLBA and HIPAA regulations all require technical safeguards to protect or guarantee the veracity of critical information. With SOX, it's for public companies to guarantee accurate financial accounting. GLBA protects personal financial information of an organization's customers. And HIPAA protects and guarantees the privacy of an individual's Personal Health...

    Provided By Tripwire

  • Webcasts // Jan 2009

    Automating SOX Compliance With Tripwire's Powerful IT Controls

    While many businesses have successfully completed a Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. The Securities and Exchange Commission (SEC) now recommends automating the Internal Controls for Financial Reporting (ICFR), the IT general controls required by SOX. And why not? Automated IT controls...

    Provided By Tripwire

  • Webcasts // Jan 2009

    SOX Compliance: Reducing Risk and Cost With Tripwire

    While many businesses have completed at least one Sarbanes-Oxley audit, the challenge is in maintaining compliance while keeping associated costs under control. In a business environment facing new and varied regulatory challenges, getting the right tools, processes and policies in place in order to sustain compliance has never been more...

    Provided By Tripwire

  • Case Studies // Jul 2010

    Desktop Virtualization Transforms Tax Service Call Center at Republic Bank: VMware View 4 Slashes Costs, Improves Productivity

    Every year Republic Bankcorps Tax Refund Solutions (TRS) business unit staffs a call center with 450 seasonal workers hired to help customers prepare tax returns. Republic Bank wanted to reduce the cost and increase efficiency of the annual tax-preparation service of its Tax Refund solutions business unit. The bank virtualized...

    Provided By VMware