Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Compliance AuditingReports
 
Rogue IT on the Rise? SAM Strategies and Tools
sponsored by CDW Corporation
VIDEO: This exclusive video covers the need for software asset management to control end users during the rise of rogue IT.
Posted: 17 Jul 2014 | Premiered: 18 Apr 2014

CDW Corporation

Information Governance University: Records Management Strategy, Transparency and Collaboration Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This session discusses expert strategies on simplifying records management
Posted: 06 Mar 2013 | Premiered: 07 Feb 2013

SearchCompliance.com

Streamline Compliance with Cloud-based Application Security
sponsored by Veracode, Inc.
DATA SHEET: This white paper introduces a cloud-based application security platform that assesses mobile, web, and third-party applications for standard controls and ensures compliance with OX, HIPAA, NIST 800-53, MAS, and other mandates.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Veracode, Inc.

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of a backup solution built to handle the requirements of volume, mobility and compliance in a more streamlined and cost-effective way.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Code42

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

CommVault Systems, Inc.

Building A Powerful IM Strategy for Large Organizations
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: Large organizations face challenges in identifying and defining requirements for the implementation of information management strategies. This classroom will lead you through Enbridge Inc.'s journey - from understanding business risks and gaining executive support, to elaborating, staffing, and implementing measureable execution techniques.
Posted: 01 Apr 2013 | Premiered: 02 Apr 2013


Sustainability: From Strategic Objective to Compliance Operation
sponsored by HP & IntelĀ®
EGUIDE: This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

HP & IntelĀ®

How to Comply with the HIPAA Security Rule
sponsored by Thawte Inc.
EGUIDE: In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Thawte Inc.

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement