Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Auditing Reports
How to Meet Compliance for Electronic Communications
sponsored by Smarsh
WHITE PAPER: This white paper examines the latest strategies for meeting electronic communications compliance across email and social media.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


Intro to Mainframe Security
sponsored by IBM
EGUIDE: Access this resource to learn about a mainframe security platform and how it offers an ecosystem of security solutions.
Posted: 02 Mar 2015 | Published: 04 Feb 2015


PCI DSS: Stronger Security for Cryptographic Keys and Digital Certificates
sponsored by Venafi
WHITE PAPER: This white paper explains the new PCI DSS requirements and gives advice for meeting them.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


How to Streamline the Regulatory Filings Process
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores one approach to streamline the regulatory filing process, ensure granular control, and avoid penalties.
Posted: 19 May 2015 | Published: 29 Apr 2015

IntraLinks, Inc

Bringing E-Discovery In-House: Risks and Rewards
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper provides a straightforward, pragmatic overview about how legal professionals and organizations confronted with eDiscovery must be able to interpret it within the context of processes, risks, and viable strategies.
Posted: 29 Sep 2015 | Published: 30 Dec 2011

Zylab International, Inc.

Simplify Information Governance for SharePoint
sponsored by RSD
WHITE PAPER: The following white paper explores how an information governance solution can effectively manage all information created in SharePoint without having to migrate other long term archiving systems.
Posted: 10 Apr 2014 | Published: 10 Apr 2014


Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013


Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012


Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by Intel Security
EGUIDE: This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Intel Security

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement