Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance AuditsReports
176 - 200 of 268 Matches Previous Page  | Next Page
The Promise of Content-Aware Identity and Access Management
sponsored by CA Technologies.
PODCAST: This podcast will focus on the area of identity and access management, and will explore some new trends that can significantly improve the effectiveness and security of your IAM strategy.
Posted: 24 Nov 2010 | Premiered: Oct 13, 2010

CA Technologies.

Three Key Areas for Improving your Compliance Programs
sponsored by CA Technologies.
PODCAST: This podcast focuses on the area of compliance, with a particular emphasis on the role of identity and access management in achieving compliance. It explores some of the key issues in compliance, and highlights techniques and best practices in identity and access management that can simplify and strengthen your compliance challenges.
Posted: 24 Nov 2010 | Premiered: Oct 21, 2010

CA Technologies.

The Business Case for Data Security
sponsored by Imperva
WHITE PAPER: This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Imperva

Achieving ISO 27001 Compliance using Titus Solutions
sponsored by TITUS
WHITE PAPER: This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

TITUS

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security
sponsored by IBM
EGUIDE: Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks.
Posted: 03 Nov 2010 | Published: 25 Oct 2010

IBM

Meeting the True Intent of File Integrity Monitoring
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security.
Posted: 29 Oct 2010 | Published: 28 Oct 2010

Tripwire, Inc.

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
sponsored by BWise
EGUIDE: This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

BWise

Effective Log Management for the IBM Power Systems (i, AIX, Linux)
sponsored by Safestone Technologies
WHITE PAPER: This paper will discuss the benefits of using a log management solution to ensure compliance in virtual environments and the features a good solution should provide your organization.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

Prepare for Vendor Audits and Improve Software Asset Management with Integrated IBM Solutions
sponsored by IBM
WHITE PAPER: Read how effective software asset management supports both cost effectiveness and cost efficiency by matching inventory with actual deployments, thereby helping to reduce over- and under-licensing.
Posted: 25 Oct 2010 | Published: 15 Jan 2010

IBM

E-Book: Data Protection Plans for Complying with Privacy Laws
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
Posted: 21 Oct 2010 | Published: 21 Oct 2010

SearchSecurity.com & SearchCompliance.com

EFG Bank Case Study
sponsored by ArcSight, an HP Company
CASE STUDY: ArcSight Logger 4 provides EFG Bank a platform that allows their auditors to easily search and review logs to prove adherence to strict compliance and regulation laws.
Posted: 21 Sep 2010 | Published: 02 Nov 2009

ArcSight, an HP Company

Impact Brief: How to Get Started with Enterprise Risk Management
sponsored by RSA
WHITE PAPER: To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

RSA

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention
sponsored by Trend Micro, Inc.
CASE STUDY: When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

NetWrix Active Directory Change Reporter - Free!
sponsored by Netwrix Corporation
SOFTWARE DOWNLOAD: Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance.
Posted: 15 Jul 2010 | Premiered: 15 Jul 2010

Netwrix Corporation

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.
Posted: 14 Apr 2010 | Published: 14 Apr 2010

Tripwire, Inc.

Center for Charter Schools at Central Michigan University Uses DocAve to Migrate Mission-Critical SharePoint Data
sponsored by AvePoint, Inc.
CASE STUDY: The Center for Charters at CMU needed a unified platform upon which to collaborate effectively, store digital assets efficiently, and maintain industry compliant audit histories. Read this case study to learn how they used DocAve SharePoint Migrator for a hassle-free migration into MOSS with no metadata loss.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Governance, Risk, Compliance: Policy Management Methods and Tools
sponsored by Symantec Corporation
EBOOK: IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions.
Posted: 15 Dec 2009 | Published: 11 Dec 2009

Symantec Corporation

Connect the Dots: Five tips on traceability to skillfully control change & improve quality
sponsored by Jama Software
WHITE PAPER: Companies with mature requirements management and traceability processes achieve 75% higher success rates. Change, if managed poorly, will wreak havoc on even the most talented and experienced development teams. Learn how traceability can benefit your team by helping you stay connected, manage change, improve quality, and more.
Posted: 08 Dec 2009 | Published: 18 Aug 2011

Jama Software

Presentation Transcript: Getting Set for e-Discovery
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.
Posted: 06 Nov 2009 | Published: 06 Nov 2009

Symantec Corporation

Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions
sponsored by Lumension
WHITE PAPER: Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Lumension

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER: This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Lumension

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

Information Security Magazine
176 - 200 of 268 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement