Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits White Papers (View All Report Types)
1 - 25 of 152 Matches Previous Page  |  Next Page
STEALTHbits Solutions for Addressing Real World Security and Compliance
sponsored by STEALTHbits
WHITE PAPER: This document discusses four deployments of STEALHbits and how these organizations fit the solutions into their existing infrastructure.
Posted: 14 Sep 2016 | Published: 01 Aug 2016

STEALTHbits

Cloud Classified
sponsored by Armor
WHITE PAPER: Discover how a popular utility provider was able to enact their tokenization project and come into compliance with PCI 3.0 mandates. Learn how they migrated the bulk of their infrastructure out of the scope of what would be assessed, helping them save millions of dollars.
Posted: 09 Aug 2016 | Published: 01 Jul 2016

Armor

Mobility In Financial Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BlackBerry

How a Top 10 Bank Uses A Data Analytics Tool to Manage Operational Risk
sponsored by Infogix
WHITE PAPER: In this case study, learn about the analytics tool a top 10 U.S. Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including reduced costs while increasing productivity, processed full audit in real time, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2014

Infogix

Oracle Audit Defense Management
sponsored by Miro Consulting, Inc.
WHITE PAPER: No one likes audits, but considering that 75% of software vendors believe that their customers don't manage their software license effectively, they're bound to happen. This white paper answers your questions about Oracle software audits, and provides 7 steps to successfully navigating through Oracle audit defense management.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Miro Consulting, Inc.

Breakthrough Security and Compliance Practices for the Digital Enterprise
sponsored by BMC
WHITE PAPER: A comprehensive, aggressive automation strategy helps to sustain a high level of security and compliance. Discover ways to make automation a strategic asset in the fight against cyberthreats.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

BMC

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: A comprehensive managed file transfer solution provides off-the-shelf integration with common security products and end-to-end visibility into and monitoring of file transfers. It will help you ensure the rapid onboarding of new customers and partners, as well as governing interactions with trading partners.
Posted: 20 Jun 2016 | Published: 01 May 2016

Axway

Making PCI Compliance Manageable
sponsored by Unisys
WHITE PAPER: While organizations implement data encryption to comply with PCI security requirements, most struggle with an increasing scope to manage their CDE with evolving business requirements. Uncover ways to mitigate resultant compliance expenses by reducing your audit scope.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Unisys

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Overcoming 4 Key Challenges of Data Privacy
sponsored by Iron Mountain
WHITE PAPER: Data privacy must be protected on a continuous basis far beyond the requirements of passing compliance audits. Learn the 4 key challenges of data privacy and how to overcome them.
Posted: 13 May 2016 | Published: 01 Apr 2016

Iron Mountain

How to Bring a Common Language to Your IT Systems
sponsored by BDNA
WHITE PAPER: This white paper provides best practices for managing your IT assets. Learn how normalizing data, enriching data, and categorizing assets can help take the pain out of IT system management.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

3 Ways to Cut the Cost and Pain of a Software Audit
sponsored by BDNA
WHITE PAPER: This white paper examines the top challenges IT professionals face when preparing for a vendor audit, as well as offering suggested solutions to cut the cost and pain of a software audit. Download now to access expert tips on how to prepare for your vendor audit.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

Three Rules for Managing Email Compliance
sponsored by ArcMail Technology
WHITE PAPER: Discover 3 email security and ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Seven Keys to a Secure Data Solution: How to Choose the Right Data Centric Audit and Security Solution
sponsored by Imperva
WHITE PAPER: Read this paper to learn how real-time visibility and blocking maximize protection, why intelligent automation lowers TCO, and what key solution features enable fast time to value.
Posted: 12 Feb 2016 | Published: 16 Dec 2015

Imperva

Five Keys to Big Data Audit and Protection
sponsored by Imperva
WHITE PAPER: Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.
Posted: 11 Feb 2016 | Published: 29 Dec 2015

Imperva

PCI Compliance: Risks that Financial Institutions can't Afford to Ignore
sponsored by Unisys
WHITE PAPER: In this guide, you'll discover the steps to reducing the scope of audit while providing end-to-end data protection and reducing costs associated Payment Card Industry Data Security Standard (PCI DSS) compliance.
Posted: 04 Dec 2015 | Published: 30 Nov 2015

Unisys

How to Select the Right Asset Management Tool
sponsored by Matrix42
WHITE PAPER: This white paper provides expert tips for selecting the right software asset management (SAM) tool to effectively manage your software licenses.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

Matrix42

8 Tips for Building an IT Asset Management Program
sponsored by ServiceNow
WHITE PAPER: This white paper outlines 8 specific recommendations for building an IT Asset Management (ITAM) program that delivers measurable business value while saving you time, money, and hassle.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

ServiceNow

Practical Guidelines for Active Risk Management when Managing Oracle Licenses
sponsored by Matrix42
WHITE PAPER: This white paper presents the 10 commandments to surviving an Oracle audit.
Posted: 28 Jul 2015 | Published: 29 Apr 2015

Matrix42

Avoiding Audit Surprises: Why License Compliance is a C-level Issue
sponsored by Matrix42
WHITE PAPER: This white paper examines how to optimize long-term license management and relieve your IT staff of manual tasks.
Posted: 16 Jul 2015 | Published: 30 Jun 2015

Matrix42

Rethinking License Management: Mobile App Delivery and Access Made Easy
sponsored by Matrix42
WHITE PAPER: This white paper outlines how to treat license management as a proactive process rather than just a standalone management tool. Continue reading to learn more.
Posted: 15 Jul 2015 | Published: 01 Jul 2015

Matrix42

How to Successfully Navigate a Software Audit
sponsored by Matrix42
WHITE PAPER: This white paper details the top 3 critical aspects of software audits, along with 5 steps to guide you through successfully navigating an audit.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Matrix42

Making Sense of Your IT Data for On-the-Fly Investigations
sponsored by Dell Software
WHITE PAPER: This white paper examines the difficulties of constant audit preparedness and gives suggestions on how to keep your organization compliant. Read on to learn how you can improve your log management, data analytics, and more for constant audit readiness.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

Dell Software

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
1 - 25 of 152 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement