Software  >   Applications Software  >   Enterprise Applications Software  >  

Regulatory Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
Regulatory Compliance Software White Papers (View All Report Types)
 
Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report
sponsored by ComputerWeekly.com
WHITE PAPER: This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Don't Let Manual Processes Hold Up Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: This white paper explores the challenges of cloud compliance and gives advice for meeting these challenges. Learn how you can make compliance simple, even in cloud and virtual environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation

Hedge Funds: Why Comply? - A Practical Guide to Developing a Culture of Compliance
sponsored by Advent Software, Inc
WHITE PAPER: This white paper written by Advent Software outlines how hedge funds can create a "culture of compliance" with best practice ideas for accurate record keeping and reporting, transparency in operations and, putting the interests of investors first.
Posted: 10 Jul 2008 | Published: 01 Jan 2006

Advent Software, Inc

Effective Log Management for the IBM Power Systems (i, AIX, Linux)
sponsored by Safestone Technologies
WHITE PAPER: This paper will discuss the benefits of using a log management solution to ensure compliance in virtual environments and the features a good solution should provide your organization.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance.
Posted: 07 Oct 2009 | Published: 15 Dec 2008

Mimecast

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement