X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 external auditing


Can Auditing and Project Management Co-Exist in an ERP Environment?
It is hard to recall the last time an ERP implementation team included an auditor as an active member. This article explores key points in a project's lifecycle

external auditing  the involvement of an external auditor may have associated and additional costs, this expenditure should be negotiated and can be offset by a reduction of future audit fees. About the Author Joseph J. Strub has extensive experience as a manager and senior consultant in planning and executing ERP projects for manufacturing and distribution systems for medium-size and Fortune 100 companies in the food & beverage, chemical, and CPG process industries. Additionally, Mr. Strub was an Information Systems

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Regulatory and Compliance

Regulatory compliance covers the requirements for ensuring products and their associated materials comply with both external and internal rules and regulations. It covers regulatory and requirements needs, as well as product related components of environmental health and safety (EH&S). 

Evaluate Now

Documents related to » external auditing

Data Privacy: Protecting the Core of your Business


Many companies are struggling to comply with a patchwork of regulations related to sensitive corporate information. As a result, companies are looking for new database security and auditing solutions to help prevent unauthorized access to confidential information—and to satisfy internal and external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches.

external auditing   Read More

Financial Reporting-Who Needs It?


Solid financial reporting applications are as different from run-of-the-mill reporting tools as financial accountancy is from bookkeeping. Organizations routinely use common reporting tools for management accounting. But financial reporting applications can elaborate financial statements for external users, helping organizations to share information as necessary and comply with disclosure requirements. TEC analyst Jorge García discusses the benefits of financial reporting tools.

external auditing   Read More

13 Things a Customer Can Do to Avoid an ERP Implementation Failure


Have you ever wondered why every time you hear a story about an enterprise resource planning (ERP) implementation failure, the vendor gets the blame? The customers did everything they could to avoid it, but the vendors either provided inappropriate training and support, or simply a poor quality product. Frankly, I do not think that an ERP implementation failure can possibly happen without at

external auditing   Read More

Case Study: Dole


Dole manages a diverse network of global shipping, manufacturing, and sales operations. It needed a system that would enable connectivity with all its global operations and support internal systems. Dole looked for a provider to take on its external and internal connectivity needs. Find out about the data exchange solution that provides Dole with connectivity along with transaction tracking, auditing, and management.

external auditing   Read More

The Essential Executive Guide to Managing Information Vulnerability


While most information vulnerabilities stem from external intrusion and theft of data, there remains a greater potential for information to be lost, stolen, or accidentally erased by internal sources—the employees. Don’t let this be the case with your business! Information vulnerability management (IVM) is a corporate issue—one that needs addressing. To learn how you can reduce your exposure, download this white paper.

external auditing   Read More

Fostering Internal and External Collaboration


Web-based collaboration with international partners, suppliers, and customers helps companies make end-to-end processes more efficient and cost-effective. An electronic enterprise resource planning (ERP) solution allows you to set up various types of external connections to your business applications, and reduce complexity. One result: you will be better able to respond to the needs of your customers. Find out more.

external auditing   Read More

The Benefits of 3-way Auditing


Whatever your reasons for needing to capture a complete audit trail for all database activity, you want to make sure your system allows you to support three accepted approaches. This three-way auditing ability can provide auditing for all activity in your database, including monitoring, reporting, and alerting on all critical data activity across your company. Learn more about these approaches, and their many benefits.

external auditing   Read More

Social Media in Your Supply Chain Keeps Everyone in the Loop


Social media is adding new value to cloud-based supply chain management for companies of all sizes. Internal social media (via Intranet) and external sites like Facebook and Twitter are being increasingly used in a new, flexible supply chain cycle. Read this article to learn how two very different companies are taking advantage of the unique contribution social media can make to the dynamic supply and demand loop.

external auditing   Read More

Better Active Directory Auditing, Less Overhead, More Power


Today's organizations, faced with stricter internal security policies and multiple regulatory compliance requirements, continue to struggle in their efforts to make Active Directory auditing simpler and more adept at fulfilling their needs. Native Windows auditing mechanisms don't meet the demands of modern businesses, and administrators are often left in the dark about significant and potentially harmful Active Directory changes. Learn how to easily improve native Active Directory auditing without making dramatic changes to your IT infrastructure in this eye-opening white paper written by renowned industry expert Don Jones.

external auditing   Read More

Addressing Guidance from the IIA's GTAG-14 for Auditing User-Developed Applications


This white paper summarizes how the Prodiance Enterprise Risk Manager (ERM) suite of user-developed applications (UDA) software tools and associated professional service offerings enable organizations to fully comply with the Institute of Internal Auditors’ (IIA’s) guidelines for identifying, risk ranking, testing, and controlling critical UDAs.

external auditing   Read More