Addressing Guidance from the IIA's GTAG-14 for Auditing User-Developed Applications

This white paper summarizes how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed applications (UDA) software tools and associated professional service offerings enable organizations to fully comply with the Institute of Internal Auditors’ (IIA’s) guidelines for identifying, risk ranking, testing, and controlling critical UDAs.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

TEC 2013 ERP Buyer's Guide for Process Manufacturing

  • Source:
A focus on user experience is driving ERP vendors to deliver lean, flexible solutions that blur the lines between traditional ERP tiers. Read this buyer’s guide and see how vendors are addressing the most pressing process manufacturing challenges—especially for food and beverage companies who face unique pressures in today’s health-conscious market—and how trends like integrated BI, in-memory analytics, mobility, and social media are changing the way process manufacturers do business.
  • Written By:
  • Published On: May 28 2013

Comparing the Total Cost of Ownership of Business Intelligence Solutions

For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions.
  • Written By:
  • Published On:

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Addressing Guidance from the IIA’s GTAG-14 for Controlling User-developed Applications

The Institute of Internal Auditors (IIA) recently released the Global Technology Audit Guide (GTAG) 14: Auditing User-developed Applications. Read how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed application (UDA) software tools and related professional service offerings enable organizations to fully comply with IIA’s guidelines for identifying, risk ranking, testing, and controlling critical UDAs.
  • Written By:
  • Published On:

Implementing Detailed User-level Auditing of UNIX and Linux Systems

UNIX and Linux systems aren’t exempt from the rigors of regulatory compliance. System logs can help you spot suspicious insider activity and contribute to more accurate compliance reports by showing which users accessed what systems, what commands they executed, and what changes they made to key files and data. Find out how centralized UNIX/Linux auditing can help you troubleshoot and reduce your risk of non-compliance.
  • Written By:
  • Published On:

A Route to Higher User Productivity

Human and intellectual capital management systems do not work in isolation. They need to be integrated with larger systems. Meta4 uses Internet and portal technology to integrate with Web and Internet standards. Learn how Meta4’s technology platform meets the execution, deployment, and integration requirements of different applications, and about Meta4’s development, maintenance, and upgrading cycles.
  • Written By:
  • Published On: