Software  >   Applications Software  >   Enterprise Applications Software  >  

Regulatory Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
Regulatory Compliance Software White Papers (View All Report Types)
 
Two Industry Experts Offer Top Tips For Records Management
sponsored by Iron Mountain
WHITE PAPER: Access this helpful e-guide to learn from two compliance experts about the key steps to developing a records and information management privacy compliance program, as well as the risks companies potentially face by not getting rid of data.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

Iron Mountain

G-Cloud Report: Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Implementation Strategy
sponsored by ComputerWeekly.com
WHITE PAPER: The Data Centre Strategy, G-Cloud and Applications Store for Government Programme (hereafter the „G-Cloud Programme‟) are 3 of the 14 strands of the Government ICT Strategy.Phase 2 of the programme started in October 2009 and ran until the middle of February 2010.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

How to make PCI DSS 3.0 compliance an every day practice or A guidebook to successful PCI DSS 3.0 compliance
sponsored by Alert Logic
WHITE PAPER: View this white paper to explore the evolution of security compliance from an annual event to an everyday practice and how to drill down the details.
Posted: 17 Mar 2015 | Published: 05 Nov 2014

Alert Logic

G-Cloud Report: Data Centre Strategy G-Cloud and The Applications Store for Government - Commercial Strategy Team
sponsored by ComputerWeekly.com
WHITE PAPER: The commercial potential of cloud computing and cloud services is widely accepted, both in private industry and in the public sector.  The opportunities for cost reduction and efficiency in the UK public sector are real and achievable, but require significant changes to procurement practices, delivery frameworks and across the supplierlandscape.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Make the Impossible Possible: Simplifying ISO Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives some helpful guidelines for compliance by laying out the steps necessary for complying with the latest revision of ISO.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

BalaBit

Achieving Effective Information Governance: Cut Storage and Discovery Costs and Help Reduce Risk
sponsored by IBM
WHITE PAPER: Learn how you can achieve effective information governance to cut storage and discovery costs and help reduce risk.
Posted: 18 Feb 2015 | Published: 31 Oct 2014

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Guide: Enterprise Security Reporter
sponsored by ScriptLogic Corporation
WHITE PAPER: In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement