X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 connection auditing


Now Andersen, Tomorrow Accenture, They’ve got a lot of Selling to do
In compliance with the August arbitrator’s report on the conflict between Arthur Andersen and Andersen Consulting, the consulting firm has announced its new

connection auditing  report was issued. AC's connection and confusion with Arthur Andersen (from which it essentially branched off in 1989) has long been a thorn in its side, although it also enabled Andersen to be identified (for good or ill) in the marketplace. Arthur Andersen can still use the name AC if it wants, but if they do, the name change from AC to Accenture will not eliminate the confusion. The SEC inquiry and future ruling on auditor independence may have an impact on this situation. Kim Petersen, a nine-year

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » connection auditing

Apparent BPM in the Cloud—Analyst Roadshow


Apparancy was born out of the idea to create a fresh business process offering that takes the best of what traditional BPM suites can provide—from workflow and business process execution to process monitoring and control monitoring—and combines it with key additional value for an organization.

connection auditing   Read More

NetBIOS Firewall


How many times do you hear network administrators scream at the top of their voice, "I have spent millions of dollars buying expensive and the best antivirus software solutions and yet every two months, when a new virus strikes, I have my entire network go down!" This is a common complaint you will get to hear from one and all network administrators, primarily because most security vendors today concentrate more on a "reactive" approach to stop virus attacks, than a “preventive” approach!

connection auditing   Read More

Identity-based NAC: Using Identity to Put the “Control” in Network Access Control


Access control is more than just checking devices for malware before admitting them to a network. Identity-based network access control (NAC) looks at the identities of users and devices, and knows what resource they are authorized to access, allowing enterprises to tightly control access, and the devices and behavior of users.

connection auditing   Read More

Mid-market ERP Vendors Leveraging (and Occasionally Outdoing) Microsoft’s “Plumbing” - Part 2


Part 1 of this blog series analyzed Epicor and SYSPRO, the two renowned enterprise resource planning (ERP) mid-market incumbents that heavily harness Microsoft’s platform tools. To that end, the business productivity tools that were illustrated in my recent blog post on what 2010 might have meant to Microsoft’s business solutions (which reflected on the highly publicized mid

connection auditing   Read More

Avercast Forecasting & Demand Planning Software


The Avercast product line includes: Avercast Business Forecasting for analyzing historical product demand, forecasting future demand, and adjusting forecasts at the individual item or summary level Avercast Supply Planning for time-phased inventory planning in monthly, weekly, or daily time periods Avercast Supplier Connection for providing Web-enabled information to suppliers Avercast Trolling For Dollars for warehouse management reporting and for providing real-time information about which products can be shipped at any given time.

connection auditing   Read More

Community, Connection, Conversation or Channel


Social networks offer many opportunities for businesses to gain a closer engagement with their customers. This appears to be an unstoppable bandwagon that all organizations must leap on before they are left behind, but is it that simple? The social network landscape is packed with choices and pitfalls for the unwary, so a careful and appropriately nuanced response is required. Read more on how to best use social media.

connection auditing   Read More

The Loyalty Connection: Measure What Matters and Create Customer Advocates


Recent surveys have shown that 76 percent of respondents rated customer loyalty as extremely or very important to top management. Many companies feel they exercise due diligence in this area, but as global competition increases and markets mature, they’ll have to go that extra mile. To better measure customer’s attitudes and behaviors, companies must make loyalty management an integral part of their business strategy.

connection auditing   Read More

A Drop-ship Enablement Pioneer Leads the Way


By providing a single plug-and-play connection to multiple trading partners, CommerceHub strives to enable basically any retailer to electronically integrate with its suppliers, regardless of the idiosyncratic systems and capabilities that might exist among them.

connection auditing   Read More

Traffic Audits Make Strange Bedfellows: Part I - The Why’s and What’s of Auditing


Have you heard the one where the Director of Product Marketing, the CIO and the auditor are found together in a small conference room? Couldn’t happen, you say? Au contraire! With traffic being the lifeblood of an e-commerce site the Marketing crew knows that the traffic numbers are going to be audited. And they look to the CIO to make sure that the numbers pass muster. If there’s a problem with the numbers, the CIO may be blamed.

connection auditing   Read More

Addressing Guidance from the IIA’s GTAG-14 for Controlling User-developed Applications


The Institute of Internal Auditors (IIA) recently released the Global Technology Audit Guide (GTAG) 14: Auditing User-developed Applications. Read how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed application (UDA) software tools and related professional service offerings enable organizations to fully comply with IIA’s guidelines for identifying, risk ranking, testing, and controlling critical UDAs.

connection auditing   Read More