Home
 > Research and Reports > White Papers > Addressing Guidance from the IIA's GTAG-14 for Auditi...

Addressing Guidance from the IIA's GTAG-14 for Auditing User-Developed Applications

Source: Prodiance Corporation
This white paper summarizes how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed applications (UDA) software tools and associated professional service offerings enable organizations to fully comply with the Institute of Internal Auditors’ (IIA’s) guidelines for identifying, risk ranking, testing, and controlling critical UDAs.


Featured publications:

TEC 2013 ERP Buyer's Guide for Process Manufacturing
Source: Technology Evaluation Centers Published On: May 28 2013 A focus on user experience is driving ERP vendors to deliver lean, flexible solutions that blur the lines between traditional ERP tiers. Read this buyer’s guide and see how vendors are addressing the most pressing process manufacturing challenges—especially for food and beverage companies who face unique pressures in today’s health-conscious market—and how trends like integrated BI, in-memory analytics, mobility, and social media are changing the way process manufacturers do business. Read More...
Getting Your Money's Worth from Fixed Assets Software
Source: Sage Companies that fail to manage fixed assets can have difficulty complying with reporting regulations and complex, changing tax laws, and thus run the risk of misstating financial information and making mistakes in tax filings. A complete fixed asset management software solution should have tracking, depreciation, and inventory features, and should also provide the ability to conduct physical inventories of assets easily and reconcile the results to the fixed asset schedule. Finally, it should include easy, functional reporting to aid compliance, auditing, and preparation of financial reports and tax filings. This white paper looks at the potential ROI of fixed asset management software. Read More...
Comparing the Total Cost of Ownership of Business Intelligence Solutions
Source: Birst For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions. Read More...


You may also be interested in these related documents:

Addressing Guidance from the IIA’s GTAG-14 for Controlling User-developed Applications
Source: Prodiance Corporation The Institute of Internal Auditors (IIA) recently released the Global Technology Audit Guide (GTAG) 14: Auditing User-developed Applications. Read how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed application (UDA) software tools and related professional service offerings enable organizations to fully comply with IIA’s guidelines for identifying, risk ranking, testing, and controlling critical UDAs. Read More...
Streamlining Your Conversion to IFRS: Challenges, Choices, and Transformative Technologies
Source: SAP Transitioning to international financial reporting standards (IFRS) is more than just a mandate—it’s an opportunity for companies to improve their financial consolidation and reporting systems, and enable rapid legal compliance. But making the switch requires careful planning, thoughtful execution, and support from personnel throughout the enterprise. Find out how your company can manage the change. Read More...
Implementing Detailed User-level Auditing of UNIX and Linux Systems
Source: Centrify UNIX and Linux systems aren’t exempt from the rigors of regulatory compliance. System logs can help you spot suspicious insider activity and contribute to more accurate compliance reports by showing which users accessed what systems, what commands they executed, and what changes they made to key files and data. Find out how centralized UNIX/Linux auditing can help you troubleshoot and reduce your risk of non-compliance. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.