Sarbanes Oxley Reports

SenSage Event Data Warehouse
sponsored by Hexis Cyber Solutions Inc
PRODUCT LITERATURE: This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more.
Posted: 01 Aug 2008 | Published: 01 Aug 2008

Hexis Cyber Solutions Inc

The Top 10 Reasons to Automate Your AP Processes
sponsored by Kofax, Inc.
WHITE PAPER: This white paper examines in detail the relevant issues and benefits of Accounts Payable (AP) transformation as well as recent industry-wide research and best practices around such initiatives.
Posted: 23 Sep 2010 | Published: 23 Sep 2010

Kofax, Inc.

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

TechTarget Security

7 Steps To Getting A Handle On Social Application In Your Enterprise
sponsored by Jive Software
WHITE PAPER: Social media is a huge part of your employees' personal lives, so why shouldn't it be integrated into their work lives as well? While some executives might be wary of incorporating social media in the workplace, they really shouldn't be. With the right management tactics, you can get the benefits of social media while still remaining in control.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Jive Software

CollabNet Success Story: Agile CMMI
sponsored by CollabNet
CASE STUDY: Facing pressure to deliver solutions quickly and meet rapidly changing priorities, investment banks are reluctant to change processes and adopt new tools. Learn how CollabNet enabled software development/change management process that would enable CMMI compliance while accommodating existing Agile development practices used by various teams.
Posted: 06 Jan 2010 | Published: 06 Jan 2010

CollabNet

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Revamping and optimizing your SAP GRC strategy
sponsored by Security Weaver
EBOOK: GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Managing the Transition to IFRS
sponsored by Oracle Corporation
PODCAST: Listen to this podcast with David Jones, Director at PWC, who has worked with multi-national companies across Europe helping them to make the transition to adopting IFRS and to improve their financial reporting in the process.
Posted: 21 Mar 2011 | Premiered: Mar 18, 2011

Oracle Corporation

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine