Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards. These standards are commonly defined by large, independent entities such as the Institute of Electrical and Electronics Engineers (IEEE), the World Wide Web Consortium (W3C) or the European Telecommunications Standards  … 
Definition continues below.
Regulatory Compliance White Papers (View All Report Types)
226 - 250 of 380 Matches Previous Page  |  Next Page
Improving Regulatory Compliance with Encryption
sponsored by Utimaco Safeware
WHITE PAPER: This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions.
Posted: 02 Feb 2009 | Published: 01 Feb 2007

Utimaco Safeware

Best Practices in Creating a Strategic Finance Function
sponsored by SAP America, Inc.
WHITE PAPER: the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

Data, Disconnected: Communications Firms Take the Necessary Steps to Build Greater Accuracy into Their Customer Management Processes
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This white paper for the communications sector examines how inaccurate data can impact customer relationships and how implementing a multi-phase process can help feed cleaner customer data into enterprise solutions to maximize return on investment.
Posted: 20 Jan 2009 | Published: 20 Jan 2009

Pitney Bowes Group 1 Software

Total Economic Impact of Oracle Identity Manager
sponsored by Oracle Corporation
WHITE PAPER: Oracle Identity Manager is an enterprise identity management system that manages users' access right and privileges, throughout the provisioning life-cycle, within enterprise IT resources.
Posted: 19 Jan 2009 | Published: 03 Nov 2008

Oracle Corporation

Managing Product Recalls to Reduce Risk and Minimize Cost
sponsored by Sage North America
WHITE PAPER: With an integrated enterprise system like Sage ERP X3, food producers can use the same system to address industry-specific requirements and product recalls.
Posted: 13 Jan 2009 | Published: 13 Jan 2009

Sage North America

2008 ERP in the Mid-Market
sponsored by Sage North America
WHITE PAPER: This report explores feedback from over 500 mid-size companies, and aims to serve as a roadmap to those that desire to reduce costs, and improving accuracy and delivery performance.
Posted: 13 Jan 2009 | Published: 13 Jan 2009

Sage North America

Web Threats: Challenges and Solutions
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this white paper to better understand Web threats and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity.
Posted: 12 Jan 2009 | Published: 12 Jan 2009

Trend Micro, Inc.

Protecting CPNI - Top Four Tips for a Successful Security Program Deployment
sponsored by RSA
WHITE PAPER: With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

RSA

Oracle Advanced Compression
sponsored by Oracle Corporation
WHITE PAPER: Oracle Database 11g introduces the Advanced Compression Option to help customers cope with data growth and storage, regulatory compliance, and application scalability and performance challenges.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

Oracle Corporation

Formalizing Operational Governance: Ensuring the Well-managed Enterprise
sponsored by Vitria Technology, Inc.
WHITE PAPER: Operational Governance poses a significant challenge for businesses today, one that has considerable direct and indirect costs. With the advent of Vitria's Operational Governance Solution, a new class of governance is available.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

Vitria Technology, Inc.

Log Management in the Cloud: A Comparison of In-House Vs. Cloud-Based Management of Log Data
sponsored by Alert Logic
WHITE PAPER: This white paper presents some questions to consider when vetting your business needs against each type of log management model.
Posted: 04 Dec 2008 | Published: 04 Dec 2008

Alert Logic

Customer Satisfaction with Email Archiving Systems
sponsored by Sunbelt Software
WHITE PAPER: Osterman Research surveyed organizations about a variety of email archiving systems to understand overall satisfaction of their current archiving system. The goal is to help decision makers in their archiving evaluation process.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

Archiving Compliance with Sunbelt Exchange Archiver
sponsored by Sunbelt Software
WHITE PAPER: Archiving for compliance is an important step in securing your company's future. Learn how to implement an email archiving solution that will minimize the burden on your Exchange server and help to avoid costly legal penalties in this whitepaper.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

The Complete Network Assessment
sponsored by Dorado Software
WHITE PAPER: This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Dorado Software

7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER: This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Qualys

Mainframe Tape Technology: Eight Myths, Realities and Best Practices
sponsored by CA Technologies.
WHITE PAPER: CA Tape Encryption is an innovative, flexible, easily implemented comprehensive z/OS tape protection solution that ensures your data is not breached even if the tapes fall into the wrong hands.
Posted: 31 Oct 2008 | Published: 30 Oct 2008

CA Technologies.

Best Practices in Instant Messaging Management
sponsored by Dell Software
WHITE PAPER: Instant messaging is a powerful tool, but is your organization protected from malware/viruses, reduced productivity and accidental transfer of sensitive documents? Read this paper to learn how to mitigate these risks.
Posted: 29 Oct 2008 | Published: 29 Oct 2008

Dell Software

Exploiting DB2 on System z to Meet Your Data Warehousing Needs
sponsored by IBM
WHITE PAPER: This white paper examines the role of data warehousing and DB2 on System environments, and it explains how you can standardize and consolidate your existing data marts and warehouses to form a mixed workload solution.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Getting a Head Start in Software Asset Management: Managing Software for Improved Cost Control, Better Security and Reduced Risk
sponsored by FrontRange Solutions Inc
WHITE PAPER: Software Asset Management (SAM) can deliver increased efficiency, better cost control, risk mitigation and patch management. This paper provides an overview of SAM benefits, and addresses the specific issues in getting SAM running in your company.
Posted: 24 Oct 2008 | Published: 01 Jul 2008

FrontRange Solutions Inc

Securing Data Stored on Tape with Encryption: How to Choose the Right Encryption Key Management Solution
sponsored by Quantum Corporation
WHITE PAPER: Q-EKM software, is designed to generate and communicate encryption keys and it is a proven, easy-to-use, library-managed encryption solution designed to protect sensitive data throughout the enterprise.
Posted: 23 Oct 2008 | Published: 23 Oct 2008

Quantum Corporation

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

Data Discovery and Risk in the Datacenter
sponsored by Tizor
WHITE PAPER: Learn how database activity monitoring (DAM) solutions mitigate data risk by discovering critical data in the data center, monitoring and analyzing activity, providing detailed auditing trails, and reporting on all user access.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Tizor

Gartner's Magic Quadrant for Security Information and Event Management 2008
sponsored by RSA
WHITE PAPER: Read this report to learn how to find an optimal SIEM solution that will support the real-time log collection, is scalable, easy to deploy and will be easy to support and maintain.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

IT Briefing: SIEM 3.0: The Next Generation of Security and Compliance Monitoring
sponsored by ArcSight, an HP Company
WHITE PAPER: Read this IT briefing to learn more about interesting trends in the security information and event monitoring (SIEM) industry.
Posted: 15 Oct 2008 | Published: 15 Oct 2008

ArcSight, an HP Company

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER: As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Tripwire, Inc.
226 - 250 of 380 Matches Previous Page    8 9 10 11 12 13    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards. These standards are commonly defined by large, independent entities such as the Institute of Electrical and Electronics Engineers (IEEE), the World Wide Web Consortium (W3C) or the European Telecommunications Standards Institute (ETSI).Conformance testing can be carried out by private companies that specialize in that service. In some instances the vendor maintains an in-house department for conducting conformance tests prior to the initial release of a product or upgrade. In the software industry, once the set of tests has been completed and a program has been found to comply with all the applicable standards, that program can be advertised as having been certified by the organization that defined the standards and the corporation or organization that conducted the tests.
Regulatory Compliance definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement