Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance,  … 
Definition continues below.
Regulatory ComplianceWhite Papers (View All Report Types)
76 - 100 of 411 Matches Previous Page  | Next Page
Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
sponsored by Tripwire, Inc.
WHITE PAPER: In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER: While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Sybase, an SAP company

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

E-Guide: Securing the cloud
sponsored by CA Technologies.
WHITE PAPER: The cloud has become a very popular way to cut costs and get ahead but the need for security standards is increasing at a rapid pace. Individuals all over, in diverse areas of business want to know that their information will/can be safe in the cloud. Read this expert E-Guide to gain an understanding for a necessary security standard in the cloud.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

CA Technologies.

Making Office 365 More Secure and Compliant
sponsored by Proofpoint, Inc.
WHITE PAPER: Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

Proofpoint, Inc.

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA, The Security Division of EMC
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA, The Security Division of EMC

Building Your Business Case for Managed File Transfer
sponsored by OpenText
WHITE PAPER: The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

OpenText

Risk and Compliance Outlook
sponsored by McAfee, Inc.
WHITE PAPER: Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

McAfee, Inc.

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Tripwire, Inc.

Say “Yes” to Mobile Devices
sponsored by McAfee, Inc.
WHITE PAPER: Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security
sponsored by McAfee, Inc.
WHITE PAPER: In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Data Security and Privacy: A Holistic Approach
sponsored by IBM
WHITE PAPER: This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk.
Posted: 09 Nov 2011 | Published: 01 Sep 2011

IBM

Best Practices for a Successful DLP Deployment
sponsored by TITUS
WHITE PAPER: This is your guide to a successful DLP deployment including 5 best practices to ensure that your DLP solution is setup for success from the start.
Posted: 08 Nov 2011 | Published: 08 Nov 2011

TITUS

Why You Should Consider Cloud-Based Email Archiving
sponsored by Perimeter eSecurity
WHITE PAPER: This whitepaper, authored by messaging industry analyst The Radicati Group, looks at the key reasons organizations should consider moving to a cloud-based archiving solution.
Posted: 02 Nov 2011 | Published: 02 Nov 2011

Perimeter eSecurity

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This guide uncovers nine simple steps for implementing smart security for your business. View now to explore why firewalls and anti-virus are not enough, and how to reduce risk while cutting costs.
Posted: 18 Oct 2011 | Published: 18 Oct 2011

Qualys

Winning the PCI Compliance Battle
sponsored by Qualys
WHITE PAPER: This resource offers a guide for merchants and member services providers for meeting the requirements PCI DSS.
Posted: 17 Oct 2011 | Published: 17 Oct 2011

Qualys

No Blind Spots in Perimeter Security with Security Event Information Management
sponsored by Radware
WHITE PAPER: Security Event Information Management (SEIM) can provide the security leap-frog in a world of point solutions – to ensure there are no blind spots in your network security architecture.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Information Classification: Delivering Security and Business Value
sponsored by Boldon James
WHITE PAPER: This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software.
Posted: 10 Oct 2011 | Published: 10 Oct 2011


RSD Glass
sponsored by RSD
WHITE PAPER: Read this brief, yet helpful fact sheet on information governance to stay ahead of your compliance issues.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

RSD

Charting the way for the Information Governance imperative
sponsored by RSD
WHITE PAPER: Read this white paper to learn more about how to reach compliance guidelines and better secure your most important information.
Posted: 26 Sep 2011 | Published: 26 Sep 2011

RSD

Turning Security Upside-down
sponsored by Webroot
WHITE PAPER: This white paper explains why security policies must be adapted to handle the sophisticated and highly targeted attacks that today's IT environments are prone to. Obtain best practices for developing a successful defense strategy and learn how cloud-based solutions fit into the security technology market.
Posted: 23 Sep 2011 | Published: 23 Sep 2011

Webroot

Securing the Cloud for the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Despite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.
Posted: 23 Sep 2011 | Published: 22 Sep 2011

Symantec Corporation

The Next Big Thing in AP … Positioning AP for the Future
sponsored by Kofax, Inc.
WHITE PAPER: The stress, demands and challenges that happen within accounts payable (AP) can lead to major mistakes resulting in compliance issues, or large financial blunders. This white paper discuses ways to automate business processes within accounts payables departments.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Kofax, Inc.
76 - 100 of 411 Matches Previous Page    2 3 4 5 6 7    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance, risk and compliance at SearchCompliance.com
Regulatory Compliance definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement