Addressing Guidance from the IIA's GTAG-14 for Auditing User-Developed Applications

This white paper summarizes how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed applications (UDA) software tools and associated professional service offerings enable organizations to fully comply with the Institute of Internal Auditors’ (IIA’s) guidelines for identifying, risk ranking, testing, and controlling critical UDAs.
  • Written By:
  • Published:
  • (Originally Published On:) )

Featured publications:

TEC 2013 ERP Buyer's Guide for Process Manufacturing

  • Source:
  • Written By:
  • Published: May 28 2013
A focus on user experience is driving ERP vendors to deliver lean, flexible solutions that blur the lines between traditional ERP tiers. Read this buyer’s guide and see how vendors are addressing the most pressing process manufacturing challenges—especially for food and beverage companies who face unique pressures in today’s health-conscious market—and how trends like integrated BI, in-memory analytics, mobility, and social media are changing the way process manufacturers do business. Read More

Comparing the Total Cost of Ownership of Business Intelligence Solutions

  • Source: Birst
  • Written By:
  • Published:
For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions. Read More

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision. Read More

You may also be interested in these related documents:

Addressing Guidance from the IIA’s GTAG-14 for Controlling User-developed Applications

The Institute of Internal Auditors (IIA) recently released the Global Technology Audit Guide (GTAG) 14: Auditing User-developed Applications. Read how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed application (UDA) software tools and related professional service offerings enable organizations to fully comply with IIA’s guidelines for identifying, risk ranking, testing, and controlling critical UDAs. Read More

Implementing Detailed User-level Auditing of UNIX and Linux Systems

UNIX and Linux systems aren’t exempt from the rigors of regulatory compliance. System logs can help you spot suspicious insider activity and contribute to more accurate compliance reports by showing which users accessed what systems, what commands they executed, and what changes they made to key files and data. Find out how centralized UNIX/Linux auditing can help you troubleshoot and reduce your risk of non-compliance. Read More

A Route to Higher User Productivity

  • Source: META4
  • Written By:
  • Published:
Human and intellectual capital management systems do not work in isolation. They need to be integrated with larger systems. Meta4 uses Internet and portal technology to integrate with Web and Internet standards. Learn how Meta4’s technology platform meets the execution, deployment, and integration requirements of different applications, and about Meta4’s development, maintenance, and upgrading cycles. Read More
 
comments powered by Disqus