Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Sarbanes Oxley Act

RSS Feed    Add to Google    Add to My Yahoo!
Sarbanes Oxley Act White Papers (View All Report Types)
 
Co-Marketing with Channel Partners: Expand Your Marketing Reach with Channel Marketing Funds
sponsored by SAP AG
WHITE PAPER: As organizations seek new ways to increase brand awareness and generate demand in more complex market environments, there has been a renewed interest in co-marketing programs. This paper provides techniques to achieve this.
Posted: 19 Sep 2008 | Published: 17 Sep 2008

SAP AG

Log Management Best Practices
sponsored by RSA
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA

Fixed Asset Inventory: A Guide to Getting Started
sponsored by Sage Software
WHITE PAPER: Deployment of a fixed asset management provides countless benefits ranging from prevention of overpayment on property tax and insurance, to  reducing the risk of non-compliance with Sarbanes-Oxley Act. Read this paper to learn about best practices for fixed asset inventory management and tips for implementing a successful inventory process.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Sage Software

Monitoring Physical Threats in the Data Center
sponsored by APC by Schneider Electric
WHITE PAPER: This paper describes the class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime.
Posted: 04 Feb 2009 | Published: 03 Feb 2009

APC by Schneider Electric

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

CWAT Data Loss Prevention - Whitepaper/Technical Review
sponsored by Software Engineering of America, Inc.
WHITE PAPER: CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks.
Posted: 25 Feb 2008 | Published: 01 Sep 2006

Software Engineering of America, Inc.

The IT Manager's Working Guide to Sustainable SOX Compliance
sponsored by SoftLanding Systems, Inc.
WHITE PAPER: Learn how to overcome real-world compliance challenges and optimize your SOX efforts. Packed with NEW resources, tips, and a SOX-specific list of COBIT 4.0 objectives, this paper offers actionable tactics to help IT departments achi...
Posted: 02 Oct 2006 | Published: 01 Aug 2006

SoftLanding Systems, Inc.

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

A Complete View Of The Enterprise: Linking Operational And Financial Planning In Global Organizations
sponsored by SAP America, Inc.
WHITE PAPER: In February 2008, CFO Research Services, a unit of CFO Publishing and part of The Economist Group, began a research project with Business Objects, an SAP company, asking senior finance executives to give views on their priorities and challenges around integrating operational and financial planning processes.
Posted: 05 Jun 2009 | Published: 01 May 2008

SAP America, Inc.

Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement