Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Auditing Reports
 
Cyber Security Awareness
sponsored by Navex Global
VIDEO: Learn how to save time and money in training employees while ensuring your organization meets legal and regulatory requirements. Access now to discover more about why distributing your security policy has never been easier.
Posted: 29 Jul 2016 | Premiered: 01 Jun 2016

Navex Global

How to Optimize Your Compliance Processes to Cut Costs
sponsored by Proofpoint, Inc.
RESOURCE: Discover how you can optimize your compliance processes proactively and use the right technology to get the job done efficiently. Gain greater control over audit-readiness to achieve a firmer bottom line.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Enterprise Security: Why you need Effective Log Management
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Mapping Security For Your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Compliance strategies for greater cyber security policies
sponsored by HP Enterprise Security
EGUIDE: Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
Posted: 05 Jun 2012 | Published: 01 Jun 2012

HP Enterprise Security

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement