Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance AuditsWhite Papers (View All Report Types)
76 - 100 of 162 Matches Previous Page  | Next Page
#CompliantData: The Social Media Data Archiving Conundrum
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover how to set the stage for social media success with the right data backup and recovery systems. Inside, learn how to gauge risk vs. reward in social media, discover how to update your compliance strategy to include social media, receive best practices for staying on top of archiving regulations and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

When It's Time for an Audit, Will You Be Ready?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices on how to best prep yourself for the audit process - learn how to create a backup and recovery plan that includes the right audit and accountability features, discover four keys to help you on the path to compliance and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

How to tackle IT audit and compliance
sponsored by ComputerWeekly.com
WHITE PAPER: IT audit is about the formal verification and validation of the quality and effectiveness of ITcontrols to support the overall business control objectives. From a security controlperspective the residual IT security risks are relatively well understood in a networkperimeter protected environment.
Posted: 20 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Has Your QSA Let You Down?
sponsored by Dell SecureWorks UK
WHITE PAPER: Check out this white paper to learn the different problems organizations have faced with their QSA's, how to recognize these problems, and how to avoid hiring a QSA that will present these problems.
Posted: 09 May 2011 | Published: 04 May 2011

Dell SecureWorks UK

Closed-loop Records Management: The Stakes Are Too High to Ignore
sponsored by RSD
WHITE PAPER: As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

RSD

Risk and Compliance Outlook
sponsored by McAfee, Inc.
WHITE PAPER: Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

McAfee, Inc.

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX
sponsored by Safestone Technologies
WHITE PAPER: This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Safestone Technologies

RAPID-DEPLOYMENT SOLUTIONS FOR SUSTAINABILITY ANALYTICS
sponsored by SAP America, Inc.
WHITE PAPER: Minimizing losses from accidents, products losses, and violations of environmental regulations requires rapid access to the right information. Read this paper to learn to how to leverage sustainability analytics that let you import data from SAP and non-SAP applications for the needed visibility.
Posted: 28 Oct 2011 | Published: 31 Dec 2010

SAP America, Inc.

Maximize the Availability of Health Data While Minimizing Storage Costs
sponsored by IBM
WHITE PAPER: The data storage requirements for a healthcare provider are among the largest and most demanding in any industry. Read this comprehensive white paper to explore new, cost-cutting ways to manage, protect, and preserve your electronic health information.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

IBM

InfoSphere Optim Data Growth Solution for Application Retirement
sponsored by IBM
WHITE PAPER: Data retention regulations, such as Sarbanes-Oxley, Basel II and HIPAA, require organizations to retain historical data in its original business context for specified periods of time. Non-compliance could result in costly penalties and fines. Learn about a data retention approach that archives critical business information.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

InfoSphere Optim Data Redaction
sponsored by IBM
WHITE PAPER: As data continues to expand and organizations find new ways to collaborate with partners and customers, the question arises: How secure is your sensitive information?  In addition, organizations must also ensure that the right information stays private. Learn how organizations are striving to support information governance programs.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Anatomy of an Archiving Project White Paper
sponsored by IBM
WHITE PAPER: Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

5 Mistakes Auditing Virtual Environments (You Don't Want to Make)
sponsored by HyTrust
WHITE PAPER: Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process.
Posted: 21 Jul 2011 | Published: 21 Jul 2011

HyTrust

SenSage Security Intelligence
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This white paper will teach you about a solution that can provide you with enterprise-wide protection and also provide you with decision support when it comes to security, risk management and compliance. So don't waste anytime and see why this real-time security solution could save your enterprise from a costly security breach.
Posted: 02 Jun 2011 | Published: 01 Feb 2010

Hexis Cyber Solutions Inc

IBM Smarter Planet Storage Solutions Insight Series
sponsored by IBM
WHITE PAPER: This paper describes how pervasive data-generating technologies are now available and examines the growing need to mine emerging applications for competitive advantage.
Posted: 19 May 2011 | Published: 01 Feb 2011

IBM

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
sponsored by Oracle Corporation
WHITE PAPER: Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

Is your user management process getting you down? Improving efficiency and security through automation
sponsored by NetIQ Europe
WHITE PAPER: Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access.
Posted: 04 May 2011 | Published: 02 May 2011

NetIQ Europe

Adaptive Security for the Health/Pharma Vertical
sponsored by Juniper Networks, Inc.
WHITE PAPER: Healthcare and pharmaceutical organizations are more sophisticated than ever before; but with that sophistication, they also face new challenges.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

Juniper Networks, Inc.

Post-Migration Best Practices: Exchange Environment Operation
sponsored by Dell Software
WHITE PAPER: In this Quest white paper, discover best practices - straight from Industry experts Nelson Ruest and Danielle Ruest - to help you have a successful post-migration operation. Learn why you MUST have the same level of post-migration planning that you had for pre-migration, and discover four key aspects of post-migration management you must know.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Dell Software

PCI Basics: What it Takes to Be Compliant
sponsored by Tripwire, Inc.
WHITE PAPER: This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Posted: 08 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.
Posted: 08 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

Validation Process and Compliance Support with IBM Maximo Asset Management in Regulated Industries
sponsored by IBM
WHITE PAPER: While there is no single method to guarantee software compliance, IBM Maximo® Asset Management can provide e-signature and e-record (audit trail) capabilities that support efforts to comply with regulations and guidelines related to e-records and e-signatures.
Posted: 08 Dec 2010 | Published: 08 Dec 2010

IBM
76 - 100 of 162 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement