Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Auditing (Compliance)

RSS Feed    Add to Google    Add to My Yahoo!
Auditing (Compliance)White Papers (View All Report Types)
 
RSA GRC Customer Case Studies
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read over 18 RSA GRC customer stories across a wide range of industries. These profiles explain how RSA Archer GRC solved a variety of GRC challenges and enabled successful compliance and risk programs.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

RSA, The Security Division of EMC

Central Reporting Tool: Streamline Compliance Reporting
sponsored by APTARE
WHITE PAPER: Uncover key compliance requirements you should address in your backup strategy and learn how a central reporting tool can help you streamline compliance reporting, ensure data is protected throughout its entire lifecycle, and produce reports to quickly and accurately demonstrate compliance.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Resolving the Catch-22 of UC&C in Regulated Environments
sponsored by Dimension Data
WHITE PAPER: This white paper explains why organizations in regulated sectors like finance, government, and healthcare have a different set of requirements for cloud-based unified communications and collaboration services, and introduces a suite of email and collaboration tools that meets these needs.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dimension Data

Simplify Information Governance for SharePoint
sponsored by RSD
WHITE PAPER: The following white paper explores how an information governance solution can effectively manage all information created in SharePoint without having to migrate other long term archiving systems.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

RSD

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

RAPID-DEPLOYMENT SOLUTIONS FOR SUSTAINABILITY ANALYTICS
sponsored by SAP America, Inc.
WHITE PAPER: Minimizing losses from accidents, products losses, and violations of environmental regulations requires rapid access to the right information. Read this paper to learn to how to leverage sustainability analytics that let you import data from SAP and non-SAP applications for the needed visibility.
Posted: 28 Oct 2011 | Published: 31 Dec 2010

SAP America, Inc.

Anatomy of an Archiving Project White Paper
sponsored by IBM
WHITE PAPER: Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement