Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance,  … 
Definition continues below.
Regulatory ComplianceWhite Papers (View All Report Types)
51 - 75 of 408 Matches Previous Page  | Next Page
Mobile Device Management (MDM) Policies: Best Practices
sponsored by Fiberlink
WHITE PAPER: Uncover the top ten mobile device management (MDM) best practices that will help you control the mobile devices used in your workplace, reducing risks to corporate data without jeopardizing employee productivity.
Posted: 23 Oct 2012 | Published: 31 May 2012

Fiberlink

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

IBM

Getting Ahead of the Compliance Curve
sponsored by Symantec Corporation
WHITE PAPER: As the number and complexity of compliance mandates continue to grow, organizations struggle to keep up, only meeting requirements in silos using a “checklist” approach. But this reactive approach only leads to more costs, inefficiencies and risk. Read now to uncover a proactive strategy that will help you get ahead of the compliance curve.
Posted: 04 May 2012 | Published: 04 May 2012

Symantec Corporation

Smarter Customers, Smarter Commerce: Innovations in the Banking Industry
sponsored by IBM
WHITE PAPER: Banks today must reassess their business models and focus more on efficiency, data collection and risk management in order to stay competitive. Uncover a unique framework that can help meet your business objectives and allow for better data management in the highly regulated financial industry.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

IBM

Mrs. Mac’s Accessing Data Is As Easy As Pie with SAP® BusinessObjects™ Edge BI Software
sponsored by SAP APJ
WHITE PAPER: To improve and coordinate decision-making across all of its departments, the Australian pie and pastry producer Mrs. Mac's knew it needed to give its staff effective tools to share and cross-reference clear and accurate data from a trusted source. Read this case study to learn about the business intelligence (BI) software that Mrs. Mac's chose.
Posted: 02 Nov 2012 | Published: 03 Nov 2011

SAP APJ

Holistic risk management: Perspectives for IT professionals
sponsored by IBM
WHITE PAPER: Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Posted: 28 Jun 2012 | Published: 16 Oct 2012

IBM

Compliance Driven Security
sponsored by Dell, Inc.
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk
sponsored by Sybase, an SAP company
WHITE PAPER: This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.
Posted: 04 Jun 2012 | Published: 30 Apr 2012

Sybase, an SAP company

How Can Content-Aware Identity and Access Management Give Me the Control I Need to Confidently Move My Business forward?
sponsored by CA Technologies.
WHITE PAPER: Organization's today have their hands full trying to adhere to regulatory requirements and reduce IT risks, all while looking for innovative ways to grow their business. This paper uncovers how to gain continuous and sustainable control and compliance though IAM, while strengthening the trust and satisfaction of your customers and partners.
Posted: 16 May 2012 | Published: 01 Feb 2012

CA Technologies.

The Role of Identity & Access Management in Achieving Continuous Compliance
sponsored by CA Technologies.
WHITE PAPER: A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform.
Posted: 14 May 2012 | Published: 01 Feb 2012

CA Technologies.

How Midsize Banks Can Overcome Escalating Security Threats
sponsored by IBM
WHITE PAPER: Like any business, midsize banks face increasing security challenges ranging from threats, compliance, changing business models and more. But what’s even more challenging is that they must address them with limited resources and expertise. In this paper, explore how to tackle security issues with a holistic, integrated approach.
Posted: 26 Apr 2012 | Published: 01 Jul 2011

IBM

Assessing Your Cloud Backup Opportunity: A guide to addressing 7 key questions about your customers
sponsored by Asigra
WHITE PAPER: This resource details seven questions and discussion points you should consider before integrating cloud backup into your service offerings.
Posted: 18 Apr 2012 | Published: 30 Dec 2011

Asigra

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
sponsored by Oracle Corporation
WHITE PAPER: Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
Posted: 09 Apr 2012 | Published: 31 Jan 2012

Oracle Corporation

Protecting Customer Data: Moving Beyond Compliance
sponsored by Voltage Security, Inc.
WHITE PAPER: The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

Voltage Security, Inc.

Ovum: Corporate eGRC update
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Posted: 29 Mar 2012 | Published: 01 Dec 2010

RSA, The Security Division of EMC

The Evolution of Information Security Management: 4-Phased Maturity Model
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Over the last few years, protecting IT assets has evolved from technology safeguards, to a full-time management discipline. Based upon this evolutionary trend, ESP developed a 4-phased security maturity model; in this paper explore each phase in-depth, including the key objectives, actions and drivers for the next phase.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA, The Security Division of EMC

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA, The Security Division of EMC

A Prudent Approach to Risk Management
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Today's organizations are in need of more comprehensive and continuous risk management programs. Unfortunately, many do not have the appropriate processes, skills or technology foundation to meet this goal. Access this resource to uncover a prudent approach that uses three simple steps to help advance your risk management cause.
Posted: 23 Mar 2012 | Published: 01 Feb 2011

RSA, The Security Division of EMC

NetIQ Sentinel 7 Review - Real-time SEIM and Log Manangement for Today
sponsored by NetIQ
WHITE PAPER: This paper offers a functional review of the latest NetIQ offering in security information and event management (SIEM) that effectively address log management issues. View now to explore how NetIQ performs in event correlation alerting, security intelligence and trend analysis and more.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

NetIQ

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

LogRhythm, Inc.

Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks

LogRhythm and NERC
sponsored by LogRhythm, Inc.
WHITE PAPER: The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

LogRhythm, Inc.

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
sponsored by Tripwire, Inc.
WHITE PAPER: In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER: While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Sybase, an SAP company
51 - 75 of 408 Matches Previous Page    1 2 3 4 5 6    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance, risk and compliance at SearchCompliance.com
Regulatory Compliance definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement