We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.
558 feature items found, showing 1-30 Sort by Relevance / Date
06/15/2012 ebizQ eGuide: Banking on the benefits  
The financial industry harnesses BPM to manage growth, decrease time to market for new products and ensure customer satisfaction. This collection of articles, edited by ebizQ Site Editor Anne Stuart, looks at using BPM not only to boost productivity and cut cuts, but to also dramatically improve global operations and regulatory compliance.
06/11/2012 BPM, banks and compliance: A combination for success  
Streamlining and automating business processes can cut costs and boosting productivity. For financial services firms, BPM offers another benefit: improving regulatory-compliance activities. In this feature, ebizQ contributor Christine Parizo explains how to gain the benefits from those efforts.
02/29/2012 Cloud-based BPM pioneers describe steps for success  
Cloud computing may be among todayís hottest IT trends, but executives faced with deciding whether to try cloud-based BPM face plenty of concerns about data security, privacy and other issues. Thatís why itís important to start with a clear strategy. In this feature, ebizQ contributor Christine Parizo offers advice on achieving that goal.
02/29/2012 Process management and the cloud: Challenges and risks  
When it comes to doing business process management (BPM) in the cloud, business and IT managers must address many of the same questions about security, cost and integration that come with any cloud-based application. At the same time, cloud-based BPM comes with particular challenges of its own. In this feature, ebizQ contributor Adam Riglian explores some of the biggest ones.
11/21/2011 BPM plays a critical role in healthcare compliance  
In this feature, ebizQ contributor Crystal Bedell describes how BPM helps healthcare providers meet ever-stricter requirements to protect patient records.
10/05/2010 Data-centric security: Ensuring security is more than just compliance  
This article considers how businesses can manage their data, understand different data types and the increasing compliance pressure that has been placed to the Data Protection Act.
08/24/2010 If A Product Hasnít Got The Right Certification Can It Be Trusted?  
This article reiterates why you shouldn't judge a book by it's cover, especially with security solutions.
07/20/2010 Car Crashes and IT security  
This article offers advice on how you should go about keeping track of certificates in a large organization so that you avoid your networks and applications from crashing.
07/15/2010 Building a Metadata Repository on a Shoestring Budget Gold Club Protected
Business users, more than ever, understand the value of metadata and are using it a number of ways - to find information, to ensure the accuracy of reports, to build new lines of business, to do impact analyses, to perform audits and to ensure they adhere to compliance mandates.
06/30/2010 Embedding Compliance into Business Processes  
The opportunities for process improvements, innovation and business growth do exist - and companies don't have to fall into the pit, even in a down economy. The organizations that seize those opportunities are the ones that will best be positioned now and when the recession ends.
05/28/2010 Changing the Rules of the Game  
This article focuses on changing the rules of information and data management as it relates to compliance, governance and managing workflows.
04/26/2010 CISO Guide to Strategy in the Cloud  
Whether building private clouds, piloting uses of public clouds or even using public clouds for production applications, CISOs will never again see the same level of opportunity to communicate their needs and build security into the Cloud.
04/05/2010 Will Virtualization & Cloud Computing Change how we Achieve Security?  
Learn how virtualization and cloud can provide businesses with more efficient management and automation of non-critical IT functions.
03/24/2010 How SaaS Can Displace Risk in a New Era of Increased Regulatory Compliance  
See how SaaS is a sensible solution that is gaining popularity among businesses working to comply with the growing number of government regulations.
03/03/2010 The Complexity Factor  
See how Business Process Guidance (BPG) will succeed in the future based on its ability to handle the increasing demands of complexity, change and compliance.
01/12/2010 10 Easy Steps to Application Security  
Learn how to develop an application that meets the needs of the business in a secure manner.
12/18/2009 How Sun's Acquisition Might Spark a Better Way to Deliver Identities  
The challenges around the Oracle/Sun acquisition are really another symptom of the same issues that have plagued our identity and security infrastructures for some time.
12/15/2009 Security Process Management -- How it Can Make or Break Network Security  
Most companies look externally to solve every network challenge, but without a process-based approach to network security, they will never be on top of the game.
12/04/2009 Legal Compliance: From Software Development to Delivery  
Implementing measures for legal compliance in the development process itself are crucial for any organization concerned with software development and delivery.
12/01/2009 Advantages of Smart Card Use in Healthcare  
Learn the many ways smart cards are addressing pressing security needs of the healthcare sector.
11/17/2009 IT's Hidden Face: A Book Excerpt  
CIO Claude Roeltgen discusses the IT-Business gap, the challenges it represents and what needs to change to improve it.
08/28/2009 A Guide to Protecting Your Vital Information  
By understanding what data is the crown jewel, you can determine what the right security controls and practices for your organization should be.
08/14/2009 Stealth Malware, Drive-Bys and the VM Security Paradigm  
Organizations should consider the following to address the growing Web malware challenge.
08/07/2009 Securing the Internet of Things  
In an age where everything is connected, the stakes are high, and all smart devices must be designed with security in mind.
07/31/2009 Are You Ready for DNSSEC Deployment?  
Organizations are expected to comply and meet the fast-approaching deadline, but few have the skills required for a successful migration from a traditional DNS infrastructure to one based on DNS Security Extensions (DNSSEC).
07/17/2009 The Failure of the End-to-End Principle in Security  
Security was not one of the original design goals of the Internet, but it's something that's definitely needed today.
07/07/2009 Taking a Proactive Approach to Enterprise Security  
By taking a proactive approach to enterprise security, organizations can maximize the effectiveness of their current IT resources.
06/26/2009 Transparency and Security in a Re-Wired U.S. Government  
By adopting a comprehensive identity management model, President Obama's new technology team can achieve the levels of participation and openness in government they desire alongside security and accountability.
06/23/2009 Five Emerging Security Trends  
What fundamental technology trends are expected to impact organizations in the next two to five years?
06/16/2009 Avoid Security Suffering With These 3 Questions  
Here are three core questions every organization, C-level executive and security consultant must answer honestly before receiving a proper security diagnosis.
Start Next

Explore Our Topics

  • EDITOR'S BRIEFING
  • Virtual Conferences
  • Webinars
  • Roundtables

BPM in Action

March 10, 2011

The sixth annual BPM in Action 2011 Virtual Conference will explore cutting-edge market developments in BPM and describe how to leverage them for improved business operation and performance. More

View All Virtual Conferences

Smart Case Management: Why It's So Smart.

Date:Nov 05, 2009
Time:12:00 PM ET- (17:00 GMT)

REGISTER TODAY!

Date:Oct 29, 2009
Time:15:00 PM ET- (19:00 GMT)

REGISTER TODAY!
View All Roundtables
  • Research Library
  • Podcasts
  • News

Joe McKendrick: Part II of II: Designing Evolve-ability into SOA and IT Systems

In part two of Joe McKendrick's recent podcast with Miko Matsumura, chief strategist for Software AG, they talk about how SOA and IT systems need to change and grow and adapt with the organization around it.

Listen Now

Phil Wainewright: Helping Brands Engage with Social Media

Phil Wainewright interviews David Vap, VP of products at RightNow Technologies, and finds out how sharing best practices can help businesses understand how best to engage with online communities.

Listen Now

Peter Schooff: Making Every IT Dollar Result in a Desired Business Outcome: Scott Hebner of IBM Rati

Scott Hebner, Vice President of Marketing and Strategy for IBM Rational, discusses a topic on the top of every company's mind today: getting the most from IT investments.

Listen Now

Jessica Ann Mola: Where Will BI Fit In? Lyndsay Wise Explains

In BI, this tough economy and the increasing role of Web 2.0 and MDM are certainly topics on people's minds today. WiseAnalytics' Lyndsay Wise addresses each of them in this informative podcast.

Listen Now

Dennis Byron: Talking with...Deepak Singh of BPM Provider Adeptia

Deepak Singh, President and CTO of Adeptia, joins ebizQ's Dennis Byron in a podcast that gets its hand around the trend of industry-specific BPM.

Listen Now
More Podcasts
  • Most Popular
  • Quick Guide
  • Most Discussed

Quick Guide: What is BPM?

Learn More

Quick Guide: What is Event Processing?

Smart event processing can help your company run smarter and faster. This comprehensive guide helps you research the basics of complex event processing (CEP) and learn how to get started on the right foot with your CEP project using EDA, RFID, SOA, SCADA and other relevant technologies. Learn More

Quick Guide: What is Enterprise 2.0?

A lot of people are talking about Enterprise 2.0 as being the business application of Web 2.0 technology. However, there's still some debate on exactly what this technology entails, how it applies to today's business models, and which components bring true value. Some use the term Enterprise 2.0 exclusively to describe the use of social networking technologies in the enterprise, while others use it to describe a web economy platform, or the technological framework behind such a platform. Still others say that Enterprise 2.0 is all of these things. Learn More