Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 256 Matches Previous Page  |  Next Page
The Role of Third-Party Tools for Office 365 Compliance
sponsored by Good Technology
WHITE PAPER: This white paper explores the compliance challenges and limitations in Office 365. Access this exclusive paper to enhance your compliance capabilities with several third-party tools like containerized mobility, data residency protection, and more.
Posted: 24 Nov 2015 | Published: 30 Jun 2015

Good Technology

Extensive Compliance Automation Through an Integrated Security Information Event Management Platform
sponsored by AccelOps Inc.
WHITE PAPER: Access this white paper to examine a comprehensive SIEM platform that cuts through operational silos and disparate infrastructures to yield unparalleled visibility, expedited incident response, efficient forensics, and audit assurance while also providing broad verification of controls and compliance documentation.
Posted: 19 Nov 2015 | Published: 30 Dec 2011

AccelOps Inc.

How to Thrive in the New Era of Professional Skepticism
sponsored by Workiva
WHITE PAPER: To be effective, auditors must demonstrate a questioning mind and a critical assessment of audit evidence. Discover how you can diligently and consistently exercise proper levels of professional skepticism by accessing this white paper now.
Posted: 18 Nov 2015 | Published: 18 Nov 2015


Special Report: Audit Fees in 2015
sponsored by Workiva
WHITE PAPER: Access this report for insight into how you can manage your security auditing process in the most efficient and cost-effective manner possible.
Posted: 12 Nov 2015 | Published: 31 Oct 2015


From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


How to Meet Compliance for Electronic Communications
sponsored by Smarsh
WHITE PAPER: This white paper examines the latest strategies for meeting electronic communications compliance across email and social media.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


PCI Compliance For Dummies
sponsored by Qualys
WHITE PAPER: Every organization that deals with cardholder data must contend with PCI DSS compliance, and this resource can help you do so without wasting time or facing complexities.
Posted: 14 Oct 2015 | Published: 31 Dec 2011


Best Practices for Classification Techniques and Data Protection
sponsored by Identity Finder, LLC
WEBCAST: In this webinar, Forrester senior analyst Heidi Shey reveals how to turn your data classification project into a success. Tune in and learn how to protect sensitive data types beyond the realm of what is considered regulated.
Posted: 12 Oct 2015 | Premiered: Jun 24, 2015

Identity Finder, LLC

How to Select the Right Asset Management Tool
sponsored by Matrix42
WHITE PAPER: This white paper provides expert tips for selecting the right software asset management (SAM) tool to effectively manage your software licenses.
Posted: 09 Oct 2015 | Published: 09 Oct 2015


Bringing E-Discovery In-House: Risks and Rewards
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper provides a straightforward, pragmatic overview about how legal professionals and organizations confronted with eDiscovery must be able to interpret it within the context of processes, risks, and viable strategies.
Posted: 29 Sep 2015 | Published: 30 Dec 2011

Zylab International, Inc.

End-to-End Defensible eDiscovery
sponsored by Zylab International, Inc.
WHITE PAPER: In this white paper, learn how you can condense eDiscovery processing to avoid data loss and legal consequences.
Posted: 29 Sep 2015 | Published: 05 Aug 2015

Zylab International, Inc.

Enterprise-class security and PCI compliance services partner with eWAY
sponsored by Datapipe
CASE STUDY: In the following case study, learn how eWay was able to reach PCI compliance with the help of Datapipe's PCI compliance solution.
Posted: 22 Sep 2015 | Published: 22 Sep 2015


The Next Stage in Creating the Value-Added Finance Function
sponsored by SAP
WHITE PAPER: In the fall of 2014, CFO Research conducted a survey among senior finance executives at large companies to explore developments in the ways that finance functions employ advanced information capabilities to support business operations. This resource details the full findings of this survey.
Posted: 18 Sep 2015 | Published: 31 Oct 2014


Prevent your SaaS provider from Handing Over Your Data
sponsored by Vaultive
WHITE PAPER: In this handy white paper, you'll learn how to mitigate the risks of blind subpoenas. Read on now to uncover how to use encryption to make it unreadable to authorities without your permission.
Posted: 17 Sep 2015 | Published: 05 Aug 2015


The Economist – Holistic Risk Management
sponsored by SAP
WHITE PAPER: Examine a holistic and strategic risk management approach to help your organization identify, audit, and address strategic risks.
Posted: 16 Sep 2015 | Published: 02 Sep 2015


PCI DSS: Stronger Security for Cryptographic Keys and Digital Certificates
sponsored by Venafi
WHITE PAPER: This white paper explains the new PCI DSS requirements and gives advice for meeting them.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Protect Your SSH Keys from Misuse
sponsored by Venafi
WHITE PAPER: This white paper discusses how you can enhance enterprise security with SSH monitoring and policy enforcement.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Do You Trust Your Cloud?
sponsored by Intel and IBM
WEBCAST: This brief video examines how to gain control and transparency over your cloud infrastructure to minimize data loss and breaches. View now to learn how to remain compliant and maintain an auditable trail.
Posted: 09 Sep 2015 | Premiered: Aug 5, 2015

Intel and IBM

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 30 Jul 2015 | Published: 09 May 2014


Avoiding Audit Surprises: Why License Compliance is a C-level Issue
sponsored by Matrix42
WHITE PAPER: This white paper examines how to optimize long-term license management and relieve your IT staff of manual tasks.
Posted: 16 Jul 2015 | Published: 30 Jun 2015


Monitoring and Enforcing Security Policy In Cloud Environments
sponsored by CloudPassage
WEBCAST: This webcast will help you build strategies for enforcing security strategies in your own enterprise, no matter how many service and application providers you employ.
Posted: 15 Jul 2015 | Premiered: Jul 15, 2015, 01:04 EDT (05:04 GMT)


Rethinking License Management: Mobile App Delivery and Access Made Easy
sponsored by Matrix42
WHITE PAPER: This white paper outlines how to treat license management as a proactive process rather than just a standalone management tool. Continue reading to learn more.
Posted: 15 Jul 2015 | Published: 01 Jul 2015


How to Successfully Navigate a Software Audit
sponsored by Matrix42
WHITE PAPER: This white paper details the top 3 critical aspects of software audits, along with 5 steps to guide you through successfully navigating an audit.
Posted: 02 Jul 2015 | Published: 02 Jul 2015


Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

How to Streamline the Regulatory Filings Process
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores one approach to streamline the regulatory filing process, ensure granular control, and avoid penalties.
Posted: 19 May 2015 | Published: 29 Apr 2015

IntraLinks, Inc
1 - 25 of 256 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement