Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Compliance AuditingReports
 
Avoid Audits and Improve Security with Effective Software Asset Management
sponsored by CDW Corporation
WHITE PAPER: This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

CDW Corporation

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains how a GRC platform can transform how an organization operates – internally, externally and legally. It explains how a suitable platform enables better, faster decision making, creating a more competitive organization.
Posted: 15 Jul 2014 | Published: 17 Apr 2014

CommVault Systems, Inc.

Top 7 Challenges of Backup Compliance and How to Overcome Them
sponsored by APTARE
WHITE PAPER: This white paper explores seven of today's major compliance challenges and highlights how one data protection solution can help organizations address them.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Evaluating Information Governance Technology
sponsored by Hewlett-Packard Company
ANALYST BRIEF: Get a list of key considerations an organization must keep in mind when evaluating information governance technologies.
Posted: 20 Sep 2014 | Published: 31 Dec 2013

Hewlett-Packard Company

The Capabilities and Benefits of Enhanced File Transfer (EFT)
sponsored by GlobalScape
WHITE PAPER: This resource features a military-grade file transfer solution that ensures compliance with internal security policies and government regulations.
Posted: 23 May 2014 | Published: 31 Dec 2013

GlobalScape

Success Story: Company Avoids 3 Serious Consequences of Backup Non-compliance
sponsored by APTARE
CASE STUDY: This white paper examines how one organization easily and affordably implemented a backup software that saves them millions of dollars annually by utilizing its trouble ticketing feature.
Posted: 05 Jul 2013 | Published: 28 Jun 2013

APTARE

The Dynamic Duo: SAM & Security
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

How to Comply with the HIPAA Security Rule
sponsored by Thawte Inc.
EGUIDE: In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Thawte Inc.

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement