Compliance Audits Reports

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
sponsored by BWise
EGUIDE: This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

BWise

Prepare for Vendor Audits and Improve Software Asset Management with Integrated IBM Solutions
sponsored by IBM
WHITE PAPER: Read how effective software asset management supports both cost effectiveness and cost efficiency by matching inventory with actual deployments, thereby helping to reduce over- and under-licensing.
Posted: 25 Oct 2010 | Published: 15 Jan 2010

IBM

E-Book: Data Protection Plans for Complying with Privacy Laws
sponsored by TechTarget Security
EBOOK: This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
Posted: 21 Oct 2010 | Published: 21 Oct 2010

TechTarget Security

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.
Posted: 14 Apr 2010 | Published: 14 Apr 2010

Tripwire, Inc.

Center for Charter Schools at Central Michigan University Uses DocAve to Migrate Mission-Critical SharePoint Data
sponsored by AvePoint, Inc.
CASE STUDY: The Center for Charters at CMU needed a unified platform upon which to collaborate effectively, store digital assets efficiently, and maintain industry compliant audit histories. Read this case study to learn how they used DocAve SharePoint Migrator for a hassle-free migration into MOSS with no metadata loss.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Governance, Risk, Compliance: Policy Management Methods and Tools
sponsored by Symantec Corporation
EBOOK: IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions.
Posted: 15 Dec 2009 | Published: 11 Dec 2009

Symantec Corporation

Presentation Transcript: Getting Set for e-Discovery
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.
Posted: 06 Nov 2009 | Published: 06 Nov 2009

Symantec Corporation

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

Information Security Magazine

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.
Posted: 10 Sep 2009 | Published: 16 Oct 2008

Oracle Corporation

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

IFRS in the Life Sciences: Broad implications
sponsored by Deloitte
WHITE PAPER: This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

The Path to IFRS Conversion: Considerations for the banking and capital markets industry
sponsored by Deloitte
WHITE PAPER: As acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

Leveraging a Maturity Model to Achieve “Proactive Compliance”
sponsored by Symantec Corporation
WHITE PAPER: Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Posted: 02 Sep 2009 | Published: 03 Aug 2009

Symantec Corporation

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
WEBCAST: SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

The Best PCI Audit of Your Life
sponsored by Lumension
WHITE PAPER: This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
Posted: 13 Aug 2009 | Published: 13 Aug 2009

Lumension

Buckle Up (On the Road to IFRS) Straight Talk Book Series
sponsored by Deloitte
WHITE PAPER: The 11th book in our Straight Talk series helps executives understand the implications of IFRS and their role in addressing the associated changes. The publication also offers practical suggestions to help companies navigate through pressing issues and developing your own conversion road map.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Deloitte

Technology Implications of IFRS adoption for U.S. Companies: More than a technical accounting change
sponsored by Deloitte
WHITE PAPER: In this publication, we explore the technology implications associated with IFRS conversion and discuss: Evaluating the potential technology impact; how companies can prepare technology and systems changes related to IFRS adoption; Major differences between U.S. Generally Accepted Accounting Principles (GAAP) and IFRS and much more.
Posted: 28 Jul 2009 | Published: 28 Jul 2009

Deloitte

Top Five Ways to Improve E-Discovery with Archiving
sponsored by Symantec Corporation
DATA SHEET: Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.
Posted: 26 Jun 2009 | Published: 21 Jan 2008

Symantec Corporation

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security

Meeting Compliance Objectives in SharePoint®
sponsored by AvePoint, Inc.
WHITE PAPER: This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

AvePoint, Inc.

Web Application Security Trends Report Q3-Q4, 2008
sponsored by Cenzic
WHITE PAPER: Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.
Posted: 20 May 2009 | Published: 20 May 2009

Cenzic

Closing the Gaps in Root Access Control
sponsored by BeyondTrust Corporation
PRESENTATION TRANSCRIPT: Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.
Posted: 14 May 2009 | Published: 14 May 2009

BeyondTrust Corporation