Financial Controls Reports

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

Internal Controls Checklist for Corporate Data Protection and Compliance
sponsored by TechTarget Security
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 11 May 2011 | Published: 09 May 2011

TechTarget Security

Overcoming the Challenges of Green Procurement through eProcurement
sponsored by Dimension Data Global
WHITE PAPER: This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program.
Posted: 30 Sep 2008 | Published: 26 Sep 2008

Dimension Data Global

Oracle Database Vault
sponsored by Oracle Corporation
WHITE PAPER: Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat.
Posted: 15 Jul 2008 | Published: 01 Jun 2007

Oracle Corporation

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Internal controls checklist for corporate data protection, compliance
sponsored by Novell, Inc.
EGUIDE: In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
Posted: 20 May 2011 | Published: 20 May 2011

Novell, Inc.

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security

How TDCX is building a people-centric business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Every digital tool deployed by TDCX is aimed at augmenting the performance and experience of its employees. In an interview with CW, Byron Fernandez, group CIO of TDCX, talks up the company's approach in ensuring its technology investments enhance employee experience, as well as the cyber security challenges in its human capital intensive business.
Posted: 06 Jul 2022 | Published: 06 Jul 2022

TechTarget ComputerWeekly.com

Case Study: Auto Trader UK cuts IT resource use through Google Cloud, Kubernetes and Istio adoption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Auto Trader is the UK's biggest online marketplace for new and used car sales. Its head of infrastructure sets out how cloud, containers and microservices will help reinforce its market-leading position in the years to come
Posted: 08 Feb 2021 | Published: 09 May 2019

TechTarget ComputerWeekly.com

Billion Dollar Blindness
sponsored by TechTarget
WEBCAST: Access this webcast to learn how using the latest intent data and AI-driven technologies can transform their productivity and yields from a market, an ICP, or a set of named ABM accounts.
Posted: 08 Feb 2021 | Premiered: Feb 19, 2020

TechTarget