Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance,  … 
Definition continues below.
Regulatory ComplianceWhite Papers (View All Report Types)
51 - 75 of 415 Matches Previous Page  | Next Page
What to Look for When Selecting a Master Data Management Solution
sponsored by Talend
WHITE PAPER: In this guide, discover what you should look for when selecting a master data management (MDM) platform and learn how the right choice can help drive strategic business initiatives such as the cloud and big data. Continue reading to learn more.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Talend

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com

Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

Best Practice Guide to Mobile Device Management
sponsored by Fiberlink
WHITE PAPER: Uncover the top ten mobile device management (MDM) best practices that will help you control the mobile devices used in your workplace, reducing risks to corporate data without jeopardizing employee productivity.
Posted: 23 Oct 2012 | Published: 31 May 2012

Fiberlink

Getting Ahead of the Compliance Curve
sponsored by Symantec Corporation
WHITE PAPER: As the number and complexity of compliance mandates continue to grow, organizations struggle to keep up, only meeting requirements in silos using a “checklist” approach. But this reactive approach only leads to more costs, inefficiencies and risk. Read now to uncover a proactive strategy that will help you get ahead of the compliance curve.
Posted: 04 May 2012 | Published: 04 May 2012

Symantec Corporation

Smarter Customers, Smarter Commerce: Innovations in the Banking Industry
sponsored by IBM
WHITE PAPER: Banks today must reassess their business models and focus more on efficiency, data collection and risk management in order to stay competitive. Uncover a unique framework that can help meet your business objectives and allow for better data management in the highly regulated financial industry.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

IBM

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods
sponsored by Attachmate Corporation
WHITE PAPER: This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach.
Posted: 10 Apr 2013 | Published: 31 Dec 2012

Attachmate Corporation

The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate
sponsored by Attachmate Corporation
WHITE PAPER: Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution.
Posted: 09 Apr 2013 | Published: 29 May 2009

Attachmate Corporation

Controlling the Cost of File Transfers
sponsored by Attachmate Corporation
WHITE PAPER: View this resource to learn about a family of managed solutions that can help you meet the file transfer needs of your enterprise without the costly, resource-hungry investment of a homegrown solution.
Posted: 09 Apr 2013 | Published: 31 Dec 2010

Attachmate Corporation

File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement
sponsored by Attachmate Corporation
WHITE PAPER: Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more!
Posted: 05 Apr 2013 | Published: 31 Aug 2010

Attachmate Corporation

Best Practices for Cloud Security
sponsored by Qualys
WHITE PAPER: In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.
Posted: 22 Jan 2013 | Published: 31 Jan 2012

Qualys

Mrs. Mac’s Accessing Data Is As Easy As Pie with SAP® BusinessObjects™ Edge BI Software
sponsored by SAP APJ
WHITE PAPER: To improve and coordinate decision-making across all of its departments, the Australian pie and pastry producer Mrs. Mac's knew it needed to give its staff effective tools to share and cross-reference clear and accurate data from a trusted source. Read this case study to learn about the business intelligence (BI) software that Mrs. Mac's chose.
Posted: 02 Nov 2012 | Published: 03 Nov 2011

SAP APJ

Holistic risk management: Perspectives for IT professionals
sponsored by IBM
WHITE PAPER: Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Posted: 28 Jun 2012 | Published: 16 Oct 2012

IBM

Compliance Driven Security
sponsored by Dell, Inc.
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk
sponsored by Sybase, an SAP company
WHITE PAPER: This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.
Posted: 04 Jun 2012 | Published: 30 Apr 2012

Sybase, an SAP company

How Can Content-Aware Identity and Access Management Give Me the Control I Need to Confidently Move My Business forward?
sponsored by CA Technologies.
WHITE PAPER: Organization's today have their hands full trying to adhere to regulatory requirements and reduce IT risks, all while looking for innovative ways to grow their business. This paper uncovers how to gain continuous and sustainable control and compliance though IAM, while strengthening the trust and satisfaction of your customers and partners.
Posted: 16 May 2012 | Published: 01 Feb 2012

CA Technologies.

The Role of Identity & Access Management in Achieving Continuous Compliance
sponsored by CA Technologies.
WHITE PAPER: A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform.
Posted: 14 May 2012 | Published: 01 Feb 2012

CA Technologies.

How Midsize Banks Can Overcome Escalating Security Threats
sponsored by IBM
WHITE PAPER: Like any business, midsize banks face increasing security challenges ranging from threats, compliance, changing business models and more. But what’s even more challenging is that they must address them with limited resources and expertise. In this paper, explore how to tackle security issues with a holistic, integrated approach.
Posted: 26 Apr 2012 | Published: 01 Jul 2011

IBM

Assessing Your Cloud Backup Opportunity: A guide to addressing 7 key questions about your customers
sponsored by Asigra
WHITE PAPER: This resource details seven questions and discussion points you should consider before integrating cloud backup into your service offerings.
Posted: 18 Apr 2012 | Published: 30 Dec 2011

Asigra

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
sponsored by Oracle Corporation
WHITE PAPER: Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
Posted: 09 Apr 2012 | Published: 31 Jan 2012

Oracle Corporation

Protecting Customer Data: Moving Beyond Compliance
sponsored by Voltage Security, Inc.
WHITE PAPER: The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

Voltage Security, Inc.

Ovum: Corporate eGRC update
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Posted: 29 Mar 2012 | Published: 01 Dec 2010

RSA, The Security Division of EMC

The Evolution of Information Security Management: 4-Phased Maturity Model
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA, The Security Division of EMC

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA, The Security Division of EMC

A Prudent Approach to Risk Management
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
Posted: 23 Mar 2012 | Published: 01 Feb 2011

RSA, The Security Division of EMC
51 - 75 of 415 Matches Previous Page    1 2 3 4 5 6    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance, risk and compliance at SearchCompliance.com
Regulatory Compliance definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement