Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Management SoftwareWhite Papers (View All Report Types)
 
Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Analyst's take: Benefits of Alpha ImageWorks 9000 for healthcare providers
sponsored by ComputerWeekly.com
WHITE PAPER: Alpha ImageWorks 9000 centralizes patient records into a single, secure repository, providing easy access, accelerated processing time and billing, and significant time saving in reviewing patient records.
Posted: 24 Oct 2011 | Published: 24 Jan 2011

ComputerWeekly.com

CFO Insights on Success: Preparing for 2015 and Beyond and How Automation Can Help
sponsored by Concur Technologies
WHITE PAPER: The following white paper to explore the current challenges and bottlenecks that face CIOs and FDs at the financial year-end. Learn the importance of automation technology and how it can drastically improve visibility, reporting, and ultimately, a simpler year-end.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Concur Technologies

Test data management: Reap the benefits of big data while maintaining control
sponsored by Informatica
WHITE PAPER: As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
Posted: 27 Mar 2014 | Published: 31 Dec 2013

Informatica

Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report
sponsored by ComputerWeekly.com
WHITE PAPER: This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Implementation Strategy
sponsored by ComputerWeekly.com
WHITE PAPER: The Data Centre Strategy, G-Cloud and Applications Store for Government Programme (hereafter the „G-Cloud Programme‟) are 3 of the 14 strands of the Government ICT Strategy.Phase 2 of the programme started in October 2009 and ran until the middle of February 2010.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012


Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker
sponsored by Prism Microsystems Inc.
WHITE PAPER: The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX).
Posted: 30 May 2008 | Published: 10 Jan 2007

Prism Microsystems Inc.

Making the FACTA Red Flags Rules Operational
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement