Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Compliance AuditingReports
 
Using Predictive Coding to Your E-Discovery Advantage
sponsored by SearchCIO.com
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

SearchCIO.com

Survive the Scrutiny of Litigation:Rediscover Records Management
sponsored by Iron Mountain
EBOOK: Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management.
Posted: 28 Aug 2012 | Published: 27 Aug 2012

Iron Mountain

The Expert's How-to on Vulnerability Management
sponsored by TechTarget
RESOURCE: You can never be too careful when it comes to your vulnerability management initiatives. This expert guide explores the steps your business can take to develop a data breach incident response plan and prevent data loss incidents. Also discover the five common web application vulnerabilities and how to prevent against them.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

HANDLE YOUR ACHIVE DATA CONFIDENTLY AND COST-EFFECTIVELY
sponsored by Iron Mountain
BROCHURE: This brochure talks about the benefits of an archival tape management solution that can make handling requests for archive data easy and quicker while also reducing costs.
Posted: 01 Apr 2014 | Published: 31 Dec 2013

Iron Mountain

Software Asset Management Webinar
sponsored by CDW Corporation
WEBCAST: Watch this important webcast to learn strategies and tactics you should be implementing now to ready for the inevitable software audit. Discover how to take a proactive approach to software asset management (SAM)
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

Information Governance Online Symposium
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Since corporate data is one of an organization's most valuable assets, it only makes sense to implement an information governance policy. By doing so, IT leaders can reduce legal risks and increase the ability to be more agile. Enter this online learning environment in order to gain information governance advice from several industry experts.
Posted: 06 Mar 2013 | Premiered: 07 Mar 2013

SearchCompliance.com

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 25 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

10 Reasons Large CompaniesUse Automated Travel andExpense Management Solutions
sponsored by Concur Technologies
WHITE PAPER: This resources gives the most frequent reasons organizations adopt an automated travel and expense management solution. These reasons included improved security, compliance, and reduced costs.
Posted: 24 Mar 2014 | Published: 30 Sep 2013

Concur Technologies

Strategies for Writing a HIPAA-friendly BYOD Policy
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
Posted: 01 Aug 2013 | Published: 05 Mar 2013

HP & Intel®

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement