Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits White Papers (View All Report Types)
1 - 25 of 142 Matches Previous Page  |  Next Page
How to Bring a Common Language to Your IT Systems
sponsored by BDNA
WHITE PAPER: This white paper provides best practices for managing your IT assets. Learn how normalizing data, enriching data, and categorizing assets can help take the pain out of IT system management.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

3 Ways to Cut the Cost and Pain of a Software Audit
sponsored by BDNA
WHITE PAPER: This white paper examines the top challenges of preparing for a vendor audit. Access now to explore 3 ways to cut the cost and pain of a software audit.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: This white paper helps CISOs identify emerging data-centric audit and protection tools that they can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

Three Rules for Managing Email Compliance
sponsored by ArcMail Technology
WHITE PAPER: Discover 3 ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Seven Keys to a Secure Data Solution: How to Choose the Right Data Centric Audit and Security Solution
sponsored by Imperva
WHITE PAPER: Read this paper to learn how real-time visibility and blocking maximize protection, why intelligent automation lowers TCO, and what key solution features enable fast time to value.
Posted: 12 Feb 2016 | Published: 16 Dec 2015

Imperva

Five Keys to Big Data Audit and Protection
sponsored by Imperva
WHITE PAPER: Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.
Posted: 11 Feb 2016 | Published: 29 Dec 2015

Imperva

PCI Compliance: Risks that Financial Institutions can't Afford to Ignore
sponsored by Unisys
WHITE PAPER: In this guide, you'll discover the steps to reducing the scope of audit while providing end-to-end data protection and reducing costs associated Payment Card Industry Data Security Standard (PCI DSS) compliance.
Posted: 04 Dec 2015 | Published: 30 Nov 2015

Unisys

How to Select the Right Asset Management Tool
sponsored by Matrix42
WHITE PAPER: This white paper provides expert tips for selecting the right software asset management (SAM) tool to effectively manage your software licenses.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

Matrix42

8 Tips for Building an IT Asset Management Program
sponsored by ServiceNow
WHITE PAPER: This white paper outlines 8 specific recommendations for building an IT Asset Management (ITAM) program that delivers measurable business value while saving you time, money, and hassle.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

ServiceNow

Practical Guidelines for Active Risk Management when Managing Oracle Licenses
sponsored by Matrix42
WHITE PAPER: This white paper presents the 10 commandments to surviving an Oracle audit.
Posted: 28 Jul 2015 | Published: 29 Apr 2015

Matrix42

Avoiding Audit Surprises: Why License Compliance is a C-level Issue
sponsored by Matrix42
WHITE PAPER: This white paper examines how to optimize long-term license management and relieve your IT staff of manual tasks.
Posted: 16 Jul 2015 | Published: 30 Jun 2015

Matrix42

Rethinking License Management: Mobile App Delivery and Access Made Easy
sponsored by Matrix42
WHITE PAPER: This white paper outlines how to treat license management as a proactive process rather than just a standalone management tool. Continue reading to learn more.
Posted: 15 Jul 2015 | Published: 01 Jul 2015

Matrix42

How to Successfully Navigate a Software Audit
sponsored by Matrix42
WHITE PAPER: This white paper details the top 3 critical aspects of software audits, along with 5 steps to guide you through successfully navigating an audit.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Matrix42

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Enterprise

Optimize Value of Enterprise Software with App Usage Management
sponsored by Flexera Software
WHITE PAPER: Ensuring software license compliance and optimizing spend aren't easy -- complex agreements, virtualization, BYOD, and other trends make it difficult to understand and demonstrate compliance. But when you can't afford overspend on software, what can you do?
Posted: 25 Jun 2014 | Published: 28 Feb 2013

Flexera Software

Top 10 Reasons Australian Businesses Automate Their Expenses
sponsored by Concur Technologies
WHITE PAPER: The following white paper explores the top 10 reasons why businesses need to consider automating their travel and expense management processes. Learn how you can gain 28% faster approval processes, 22% greater policy compliance, 40% cost reduction, and more.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Concur Technologies

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Transferring Data without Secure Protocols?
sponsored by GlobalScape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

GlobalScape
1 - 25 of 142 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement