Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance,  … 
Definition continues below.
Regulatory ComplianceMultimedia (View All Report Types)
26 - 50 of 82 Matches Previous Page  | Next Page
Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

Email Archiving in Exchange 2010: Are Third-Party Solutions Still Necessary?
sponsored by Proofpoint, Inc.
WEBCAST: With the introduction of basic email retention and discovery features in Exchange 2010, some organizations are delaying or canceling the deployment of third-party email archiving solutions. But can Exchange adequately address these three critical business issues? And what about organizations that aren't planning to upgrade anytime soon?
Posted: 16 Feb 2010 | Premiered: Feb 16, 2010

Proofpoint, Inc.

PCI Compliant Yesterday. Still Compliant Today?
sponsored by Tripwire, Inc.
WEBCAST: This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.
Posted: 29 Jan 2010 | Premiered: Jan 29, 2010

Tripwire, Inc.

How Barclays Global Investors Centralized Development and Got Compliant--FAST!
sponsored by CollabNet
WEBCAST: Discover an ALM platform that will help meet aggressive government deadlines, centralize development, and implement a long-term strategy that has continued to power global development environments for years.
Posted: 07 Jan 2010 | Premiered: Jan 7, 2010

CollabNet

Data Protection for Virtual Environments Webcast
sponsored by Quantum Corporation
WEBCAST: In this webcast, Greg Schulz, Founder and Senior Analyst at The StorageIO Group, and Randy Glissman, Solutions Marketing Manager at Quantum, explore solutions for virtual server data protection and discuss general data center trends and perspectives.
Posted: 22 Sep 2009 | Premiered: Sep 21, 2009

Quantum Corporation

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
WEBCAST: SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

Data Protection for Virtual Environments
sponsored by Quantum Corporation
WEBCAST: Please join this webcast as Randy Glissmann, Solutions Marketing Manager, Quantum, explains Quantum solutions for virtual server data protection. Greg Schulz, Founder and Sr. Analyst – The StorageIO Group and author of "Resilient Storage Networks" and "The Green and Virtual Data Center," will also be speaking.
Posted: 20 Aug 2009 | Premiered: Sep 26, 2008

Quantum Corporation

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

Six Best Practices to Prevent Enterprise Data Loss
sponsored by RSA, The Security Division of EMC
VIDEO: Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used.
Posted: 05 Feb 2009 | Premiered: 05 Feb 2009

RSA, The Security Division of EMC

Preparing For Email and File Archiving Best Practices
sponsored by Proofpoint, Inc.
VIDEO: Learn how to get started on building a business case for deployment, preparing your organizations' employees and understanding the new federal rules of civil procedure.
Posted: 16 Jan 2009 | Premiered: 15 Jan 2009

Proofpoint, Inc.

Webcast - Closing the Four Security Risk Gaps of Mainframe Console Access
sponsored by I/O Concepts Inc.
WEBCAST: The information presented in this webcast can help you be sure your company's commitment to security includes all levels of mainframe access.
Posted: 05 Dec 2008 | Premiered: Dec 5, 2008

I/O Concepts Inc.

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

Ensure Data Protection with Sun StorageTek T10000B Tape Drives
sponsored by Sun StorageTek
VIDEOCAST: Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
Posted: 24 Oct 2008 | Premiered: Oct 23, 2008

Sun StorageTek

Shouldn't Single Sign-on Be Child's Play?
sponsored by Microsoft & Quest Software
WEBCAST: Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
Posted: 10 Oct 2008 | Premiered: Nov 4, 2008, 14:00 EST (19:00 GMT)

Microsoft & Quest Software

Email management suite
sponsored by Iron Mountain
VIDEO: Email management solutions are designed to simplify your email management complexities. In this brief Videocast, legendary British comic, John Cleese, explains why you should want a total email management suite.
Posted: 26 Jun 2008 | Premiered: 25 Jun 2008

Iron Mountain

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

The ROI of Database Archiving
sponsored by IBM
WEBCAST: This webcast explores how data archiving will enable you to improve the performance of mission critical applications and databases, control infrastructure costs and support sound data governance.
Posted: 03 Jun 2008 | Premiered: Jun 19, 2008, 14:00 EDT (18:00 GMT)

IBM

Getting Started with Online Storage for Backup Exec
sponsored by Symantec Corporation
PODCAST: In this podcast, Symantec Product Manager Darren Niller provides a step by step overview of the process on getting started with Symantec Online Storage.
Posted: 29 Feb 2008 | Premiered: Feb 29, 2008

Symantec Corporation

Symantec Protection Network and Online Backup: An Executive Overview
sponsored by Symantec Corporation
PODCAST: In this podcast, Sr. Manager of Product Management, Mike Baldwin, provides an overview of the Symantec Protection Network and the Online Backup offering of the newly launched Symantec service.
Posted: 29 Feb 2008 | Premiered: Feb 19, 2008

Symantec Corporation

Best Practices for Database Security and Compliance
sponsored by Guardium, an IBM Company
WEBCAST: Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)

Guardium, an IBM Company

Disk-Based Backup & Recovery
sponsored by Datalink Corp
WEBCAST: Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are.
Posted: 03 Jan 2008 | Premiered: Jan 16, 2008, 12:30 EST (17:30 GMT)

Datalink Corp
26 - 50 of 82 Matches Previous Page    1 2 3 4    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance, risk and compliance at SearchCompliance.com
Regulatory Compliance definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement