Business of Information Technology  >   Business Management  >   Financial Management  >   Auditing (Finance)  >  

Compliance (Finance)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Financial Compliance
DEFINITION: Compliance assesses whether actual money- raising and spending adhere to budget mandates set by a governing body.
Compliance (Finance) Reports
76 - 100 of 221 Matches Previous Page  |  Next Page
Advances in Financial Disclosure and Risk Management
sponsored by IBM
WEBCAST: This on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.
Posted: 01 Nov 2013 | Premiered: Feb 5, 2013

IBM

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life.
Posted: 18 Sep 2013 | Published: 18 Sep 2013

SearchSecurity.com

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
sponsored by IBM
WHITE PAPER: Discover how the IBM Security zSecure suite contains the components you need to manage your mainframe, monitor for threats, audit usage and configurations, and enforce policies to ensure compliance.
Posted: 08 Mar 2013 | Published: 31 Aug 2011

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

File Archive: the next big thing?
sponsored by EMC Corporation
VIDEO: Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.
Posted: 08 Oct 2013 | Premiered: 08 Oct 2013

EMC Corporation

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Hitting the Information Governance and Compliance Sweet Spot
sponsored by IBM
EGUIDE: In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Information Governance for Business Value
sponsored by IBM
EGUIDE: In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

Understanding the Data Management Challenges of Dodd-Frank
sponsored by Bloomberg
PRESENTATION TRANSCRIPT: Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

Bloomberg

Banca Carige Video
sponsored by IBM.
VIDEO: In this brief video, discover how Banca Carige, a leading bank in Italy with over 700 branches, chose and implemented a large-scale data analytics platform in order to enable real-time analytics in all of its locations, improving business performance and individual client services.
Posted: 21 May 2013 | Premiered: 18 Dec 2012

IBM.

May Information Security Magazine
sponsored by SearchSecurity.com
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

SearchSecurity.com

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com
76 - 100 of 221 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement