Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Section 404

RSS Feed    Add to Google    Add to My Yahoo!
Section 404White Papers (View All Report Types)
 
Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

Audit Tracking & SOX Compliance
sponsored by RevSoft
WHITE PAPER: Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

Why Compliance Pays: Reputations and Revenues at Risk Research Report
sponsored by Symantec Corporation
WHITE PAPER: Based on what is working among organizations with the fewest data losses, this IT Policy Compliance Group report identifies several practices that can assist businesses with improving IT compliance results and reduce business downtime.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker
sponsored by Prism Microsystems Inc.
WHITE PAPER: The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX).
Posted: 30 May 2008 | Published: 10 Jan 2007

Prism Microsystems Inc.

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

The Business Case for Data Security
sponsored by Imperva
WHITE PAPER: This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Imperva

The Renewed Finance Function: Extending Performance Management Beyond Finance
sponsored by SAP America, Inc.
WHITE PAPER: In August 2007, CFO Research Services launched a research program to explore the ways in which the role of the finance team has changed in recent years. This report presents the findings of our online survey of 255 senior finance executives.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

2013 Data Governance Survey Results
sponsored by Rand Secure Data
WHITE PAPER: Check out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.
Posted: 10 Mar 2014 | Published: 09 Oct 2013

Rand Secure Data

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement