Home
 > Research and Reports > White Papers > Addressing Guidance from the IIA's GTAG-14 for Auditi...

Addressing Guidance from the IIA's GTAG-14 for Auditing User-Developed Applications

Source: Prodiance Corporation
This white paper summarizes how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed applications (UDA) software tools and associated professional service offerings enable organizations to fully comply with the Institute of Internal Auditors’ (IIA’s) guidelines for identifying, risk ranking, testing, and controlling critical UDAs.


Featured publications:

TEC 2013 ERP Buyer's Guide for Process Manufacturing
Published On: May 28 2013 A focus on user experience is driving ERP vendors to deliver lean, flexible solutions that blur the lines between traditional ERP tiers. Read this buyer’s guide and see how vendors are addressing the most pressing process manufacturing challenges—especially for food and beverage companies who face unique pressures in today’s health-conscious market—and how trends like integrated BI, in-memory analytics, mobility, and social media are changing the way process manufacturers do business. Read More...
Comparing the Total Cost of Ownership of Business Intelligence Solutions
Source: Birst For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions. Read More...
11 Criteria for Selecting the Best ERP System Replacement
Source: Epicor An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision. Read More...


You may also be interested in these related documents:

Addressing Guidance from the IIA’s GTAG-14 for Controlling User-developed Applications
Source: Prodiance Corporation The Institute of Internal Auditors (IIA) recently released the Global Technology Audit Guide (GTAG) 14: Auditing User-developed Applications. Read how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed application (UDA) software tools and related professional service offerings enable organizations to fully comply with IIA’s guidelines for identifying, risk ranking, testing, and controlling critical UDAs. Read More...
How to Reduce Business Risk through Secure User Access for SAP
Source: SECUDE International AG Unencrypted communication between users’ workstations and the backend SAP servers is a significant vulnerability to your SAP environment. This can put the confidential data inside your SAP systems and your entire business activity at risk—and have a negative impact on your customers. Find out how to reduce business risks and improve audit results through encrypted communication and two-factor user authentication for SAP. Read More...
Implementing Detailed User-level Auditing of UNIX and Linux Systems
Source: Centrify UNIX and Linux systems aren’t exempt from the rigors of regulatory compliance. System logs can help you spot suspicious insider activity and contribute to more accurate compliance reports by showing which users accessed what systems, what commands they executed, and what changes they made to key files and data. Find out how centralized UNIX/Linux auditing can help you troubleshoot and reduce your risk of non-compliance. Read More...

 
comments powered by Disqus



Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.