Home
 > search for

Featured Documents related to » cobit



ad
Get Free ERP Systems Comparisons Now

Find the best ERP software solution for your business!

Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!

Country:

 Security code
Already have a TEC account? Sign in here.

Documents related to » cobit


Segregation of Duties and Its Role in Sarbanes-Oxley Compliance Issues
The Sarbanes-Oxley Act (SOX) requires publicly traded firms to demonstrate that their accounting and reporting practices are in compliance with regulatory standards. Section 404 of SOX addresses the concept and practice of segregation of duties—a key aspect of this legislation, and the focus of this article.

COBIT: Sarbanes-Oxley Act, SOX, compliance, segregation of duties, SOD, business process transparency, accounting methods, accounting principles, GAAP, Norwalk Agreement, IFRS, COBIT, ISACA, small to medium business, SMB, fraud prevention, financial reporting, IT application controls, enterprise resource planning, ERP, segregation of duties control matrix.
8/27/2008

Process-based Governance, Risk Management, and Compliance
The right balance of automated processes with paper records and manual, human interaction is necessary to keep costs under control with a flexible yet controlled set of procedures. The strategic software category, governance, risk management, and compliance, is poised to help.

COBIT: governance, risk management, compliance, GRC, process-based GRC, Sarbanes-Oxley Act, SOX, regulatory compliance, business risk, information technology, IT, Kiran Garimella, business process management, BPM, Control Objectives for Information and Related Technologies, COBIT, control tests, service oriented architecture, SOA, model-driven architecture, MDA, business activity monitoring.
7/23/2008

The Wizardry of Business Process Management – Part 1 » The TEC Blog


COBIT: adobe livecycle, appian, aris, ascentn, bam, BPM, bre, business activity monitoring, business process analysis, business process management, business rules engine, cobit, collaboration, content management, cordys, corticon, ECM, fair isaac, fico, fujitsu interstage, gartner, global 360, ibm bpm, ids scheer, ilog, itil, itsm, lombardi software, metastorm, model driven architecture, oracle bpm, pallas athena, pega, pegasystems, process automation, process modeling, SaaS, sap netweaver bpm, savvion, Six Sigma, soa, software ag, tibco, tqm, ultimus, .
21-05-2009

The Wizardry of Business Process Management – Part 1 » The TEC Blog


COBIT: adobe livecycle, appian, aris, ascentn, bam, BPM, bre, business activity monitoring, business process analysis, business process management, business rules engine, cobit, collaboration, content management, cordys, corticon, ECM, fair isaac, fico, fujitsu interstage, gartner, global 360, ibm bpm, ids scheer, ilog, itil, itsm, lombardi software, metastorm, model driven architecture, oracle bpm, pallas athena, pega, pegasystems, process automation, process modeling, SaaS, sap netweaver bpm, savvion, Six Sigma, soa, software ag, tibco, tqm, ultimus, .
21-05-2009

Measuring the Business Value of IT
Measuring the Business Value of IT. Find Solutions and Other Applications for Your Decision Associated with Business Value of IT. Many organizations do a poor job of measuring the business value of their IT investments. Simple financial metrics are not good enough. But there are a number of consistent, repeatable, and credible measurement methodologies that hold both business users and IT departments accountable. Compare four methodologies, and learn how adding one of them to your overall governance framework can improve your IT investment returns.

COBIT:
12/10/2008 3:33:00 PM

4 Key Steps to Automate IT Security Compliance
4 Key Steps to Automate IT Security Compliance. Get Free Assessment Guides for IT Security Compliance. An unprecedented wave of security breaches has led to the establishment of technical standards, IT governance frameworks and laws designed to improve and enforce IT security. Companies are under increasing pressure to control their IT infrastructures more effectively. Learn how ongoing automated vulnerability assessments, together with well-defined network security policies, can simplify the compliance process.

COBIT:
11/5/2008 11:32:00 AM

Business Engine: Driving Project Portfolio Management for IT Departments in the Enterprise Market
Business Engine provides best-of-breed PPM functionality for internal IT departments, focusing on financial governance. For organizations seeking flexible workflow and IT governance capabilities, BEN delivers functionality in the financial services, health care, government, manufacturing, telecommunications, pharmaceuticals and retail vertical markets.

COBIT: Business Engine, Business Engine Network, project portfolio management, IT governance, financial governance.
3/24/2006

How to Maximize Your IT Services with Lifecycle Management
How to Maximize Your IT Services with Lifecycle Management. Reports and Other Software Program to Use In Your Dynamic System with Lifecycle Management. As businesses become increasingly dependent on technology, service quality becomes more important. With so much riding on IT’s performance, a new service-centric model has emerged: service lifecycle management (SLcM). Based on the Information Technology Infrastructure Library (ITIL) principles, SLcM provides a framework that enables organizations to optimize business outcomes and facilitate continual service improvement.

COBIT:
12/18/2007 4:14:00 PM

10 Steps to Continuous Compliance: Putting in Place an Enterprise-wide Compliance Strategy
Your Challenge: Get Decision Makers' Approval for Putting in Place an Enterprise-wide Compliance Strategy. Specific, Measurable, Achievable, Relevant and Time-Bound. Understanding the full scope of risk in today’s complex business environment is a must for achieving compliance with governmental mandates and industry regulations. However, many companies have a limited perception of risk and struggle to make compliance an enterprise-wide, integrated process. Compliance is no longer a one-time isolated project; it’s an ongoing effort—and you’re just tens steps away from discovering why.

COBIT:
2/5/2008 12:07:00 PM

Vulnerability Management Buyer’s Checklist
Vulnerability Management Buyer's Checklist. Find Free IT Reports, Case Studies, and Other Resources Related to Vulnerability Management. Choosing a solution for vulnerability management (VM) is a critical step toward protecting your organization’s network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily deluge of new vulnerabilities that threaten security. This 12-point short list of considerations can help you determine what solutions will work best for your organization.

COBIT:
1/9/2009 10:07:00 AM

IT Governance: Maximizing the Business Investment
Implementing information technology (IT) governance means using a structure of relationships and processes to direct an organization. Some project portfolio management (PPM) vendors have adopted the IT governance mantra to differentiate their solutions from those offered by the enterprise resource planning (ERP) industry.

COBIT: information technology, IT governance, project portfolio management, PPM, software vendors, compliance issues, professional services automation, PSA, enterprise resource planning, ERP.
12/13/2005


Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others