Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software White Papers (View All Report Types)
1 - 25 of 115 Matches Previous Page  |  Next Page
Case Study: Global Bank Achieves Regulatory Compliance
sponsored by OpenText
WHITE PAPER: Access this case study to discover how a Fortune 500 bank easily ensured accessibility compliance without tearing its attention away from other compliance or security concerns.
Posted: 25 Nov 2015 | Published: 25 Nov 2015


The Role of Third-Party Tools for Office 365 Compliance
sponsored by Good Technology
WHITE PAPER: This white paper explores the compliance challenges and limitations in Office 365. Access this exclusive paper to enhance your compliance capabilities with several third-party tools like containerized mobility, data residency protection, and more.
Posted: 24 Nov 2015 | Published: 30 Jun 2015

Good Technology

Inflexible ERP: The High Cost of Business Disruption
sponsored by Unit4
WHITE PAPER: Access this brief but informative infographic to learn how common business changes affect ERP spending, and the pain-points you need to address the most.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Stealth Compliance Strategies
sponsored by Unisys
WHITE PAPER: Access this guide to find software-defined security strategies that help government and commercial enterprises prevent highly sensitive data, systems, and intellectual property from being compromised.
Posted: 20 Nov 2015 | Published: 30 Jun 2015


Extensive Compliance Automation Through an Integrated Security Information Event Management Platform
sponsored by AccelOps Inc.
WHITE PAPER: Access this white paper to examine a comprehensive SIEM platform that cuts through operational silos and disparate infrastructures to yield unparalleled visibility, expedited incident response, efficient forensics, and audit assurance while also providing broad verification of controls and compliance documentation.
Posted: 19 Nov 2015 | Published: 30 Dec 2011

AccelOps Inc.

Modernizing Your Active Directory Environment
sponsored by Dell Software
WHITE PAPER: Access this white paper and find out how legacy active directory (AD) structures can be updated to accommodate changes in technology. Discover top areas in which AD modernization should occur, and the benefits of updating each one.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Dell Software

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015

LogRhythm, Inc.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Keeping Air Traffic Controllers Informed with a Cloud-Based Compliance Application
sponsored by Microsoft
WHITE PAPER: In this white paper, learn how NAC CANADA was able to streamline compliance by automating a necessary, but mostly manual and paper-based read-and-acknowledge process. Read on to learn about the cloud platform they chose, and the benefits it provided.
Posted: 11 Nov 2015 | Published: 31 Mar 2015


Securing, Categorizing, and Archiving Digital Photographs, Images and Videos
sponsored by Unisys
WHITE PAPER: This solution brief sheds light on image processing services that assist with managing, storing and securing images. Take a look and discover answers to common video, image, and audio securing questions.
Posted: 10 Nov 2015 | Published: 30 Sep 2015


From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


How to Meet Compliance for Electronic Communications
sponsored by Smarsh
WHITE PAPER: This white paper examines the latest strategies for meeting electronic communications compliance across email and social media.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


Why The Bank You Know Today Will Disappear
sponsored by SAP
WHITE PAPER: In this white paper, read about 3 key areas where banks are lagging behind, and how banks can improve customer experience, collaboration, and agility to effectively function in today's digital landscape.
Posted: 05 Nov 2015 | Published: 21 Sep 2015


Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Don't Let PCI Compliance Get in the Way of Productivity
sponsored by Unisys
WHITE PAPER: Most businesses struggle to maintain payment card industry (PCI) compliance while also enabling business efficiency. This white paper can help you find that balance.
Posted: 15 Oct 2015 | Published: 15 Oct 2015


Aggravation or Aggregation: Risk Data and Compliance
sponsored by SAS
WHITE PAPER: Access this survey now to uncover best practices that your bank may use as a guide in formulating a response to comply with BCBS 239 principles. Read on to learn more.
Posted: 14 Oct 2015 | Published: 31 Dec 2014


Navigate The Future Of Identity And Access Management
sponsored by Covisint
WHITE PAPER: In this Forrester Report, discover analysts' revelations about how to support new initiatives in an increasingly competitive business environment with superior security.
Posted: 08 Oct 2015 | Published: 03 Aug 2015

Information Governance: People, Process & Technology
sponsored by DLT & Veritas
WHITE PAPER: This white paper outlines what you need to know about information governance and compliance as it relates to data storage. Read on to learn from industry experts about how backup technology can help reduce legal risks and costs for businesses.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

DLT & Veritas

2015 Electronic Communications Compliance Survey Report
sponsored by Smarsh
WHITE PAPER: This 5th annual Electronic Communications Compliance Survey Report explores the current landscape of compliance and the emerging risks/threats.
Posted: 06 Oct 2015 | Published: 26 Aug 2015


Why Fast, Effective E-Discovery is Critical
sponsored by Smarsh
WHITE PAPER: This white paper examines how an archiving platform can significantly reduce the time and costs associated with e-discovery. Read on to learn how this approach can simplify e-discovery for both IT and legal teams.
Posted: 02 Oct 2015 | Published: 02 Oct 2015


Midwest BankCentre Strengthens Security and Increases Business Velocity
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper describes how Midwest BankCentre was able to secure internal and external information sharing with regulators, examiners, and business partners using inter-enterprise content management and collaboration services.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IntraLinks, Inc

The Critical Need for Enterprise-Grade File Sync and Share
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper introduces methodologies for mitigating risks associated with consumer-focused file sync and share (CFSS) and lowering the costs of managing corporate information. Learn how enterprise-grade file sync and sharing (EFSS) will enable continued efficiency for users, while putting IT back in charge of corporate content.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IntraLinks, Inc

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 30 Jul 2015 | Published: 09 May 2014


Avoiding Audit Surprises: Why License Compliance is a C-level Issue
sponsored by Matrix42
WHITE PAPER: This white paper examines how to optimize long-term license management and relieve your IT staff of manual tasks.
Posted: 16 Jul 2015 | Published: 30 Jun 2015


15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

1 - 25 of 115 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement