Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 222 Matches Previous Page  |  Next Page
Information Governance Audit: 5 Steps You Should Take
sponsored by Veritas
RESOURCE CENTER: Access this article to learn how to better perform security audits and keep your IT environment safe and secure.
Posted: 29 Jan 2016 | Published: 30 Dec 2015

Veritas

Utility Protects Servers and Simplifies Compliance with Access Management
sponsored by FoxT
CASE STUDY: Defining, managing, and enforcing authentication automatically across diverse IT platforms and locations is no easy feat. This case study explores how South Western Electric & Power Company enabled effective access control and centralized administration, authentication, authorization, and auditing.
Posted: 06 Jan 2016 | Published: 04 Dec 2015

FoxT

Devise a Cloud Security Strategy for Governance Needs
sponsored by IBM
EGUIDE: This expert e-guide teaches you how to build a cloud security strategy that aligns with compliance requirements and governance needs.
Posted: 23 Dec 2015 | Published: 09 Dec 2015

IBM

Global Food and Beverage Provider Centralizes Privileged Access Management
sponsored by FoxT
CASE STUDY: In this white paper, you'll review how one global food and beverage provider automated identity and access management (IAM) processes to rectify a failed SOX audit. Read on to learn if their modified strategy is right for your organization.
Posted: 21 Dec 2015 | Published: 01 Dec 2015

FoxT

Automate PCI Compliance Monitoring, Investigation & Reporting
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper outlines the 12 PCI DSS requirements a compliance automation strategy needs to fulfill and explores what features to look for when selecting an approach.
Posted: 01 Dec 2015 | Published: 13 Apr 2011

AccelOps Inc.

Extensive Compliance Automation Through an Integrated Security Information Event Management Platform
sponsored by AccelOps Inc.
WHITE PAPER: Access this white paper to examine a comprehensive SIEM platform that cuts through operational silos and disparate infrastructures to yield unparalleled visibility, expedited incident response, efficient forensics, and audit assurance while also providing broad verification of controls and compliance documentation.
Posted: 19 Nov 2015 | Published: 30 Dec 2011

AccelOps Inc.

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

SQL Compliance Manager: Free 14-Day Trial
sponsored by Idera
SOFTWARE DOWNLOAD: Acquiring a top-notch compliance management system for SQL Server is no easy task. Fortunately, there's a way for you to figure out what you need without making a final commitment. Uncover the ins-and-outs of SQL Compliance Manager by getting your hands on a completely free 2-week trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Enterprise

Optimize Value of Enterprise Software with App Usage Management
sponsored by Flexera Software
WHITE PAPER: Ensuring software license compliance and optimizing spend aren't easy -- complex agreements, virtualization, BYOD, and other trends make it difficult to understand and demonstrate compliance. But when you can't afford overspend on software, what can you do?
Posted: 25 Jun 2014 | Published: 28 Feb 2013

Flexera Software

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Top 10 Reasons Australian Businesses Automate Their Expenses
sponsored by Concur Technologies
WHITE PAPER: The following white paper explores the top 10 reasons why businesses need to consider automating their travel and expense management processes. Learn how you can gain 28% faster approval processes, 22% greater policy compliance, 40% cost reduction, and more.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Concur Technologies

Revolutionizing Home Entertainment
sponsored by Adobe EchoSign
CASE STUDY: The following case study explores how by leveraging Adobe EchoSign, TiVo was able to remove days off their contract lifecycle, increased control and visibility into the workflow, as well as improved audit trails for their internal records. Read on to learn how you can achieve similar results.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Adobe EchoSign

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Transferring Data without Secure Protocols?
sponsored by GlobalScape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

GlobalScape

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by Commvault
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Commvault
1 - 25 of 222 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement