Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance AuditsReports
26 - 50 of 257 Matches Previous Page  | Next Page
Expenses, VAT and HMRC Compliance in a Nutshell
sponsored by Concur Technologies
WHITE PAPER: 75% of senior finance leaders say they wish they knew more about employee expenses and VAT reclaim. If you're a member of that overwhelming population, then this e-book is for you. Download now to get a crash course on the often-misunderstood concepts of VAT, compliance, HMRC policies, and expenses.
Posted: 01 Apr 2014 | Published: 30 Nov 2013

Concur Technologies

Software Asset Management: Pay Attention or Pay Up
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

HANDLE YOUR ACHIVE DATA CONFIDENTLY AND COST-EFFECTIVELY
sponsored by Iron Mountain
BROCHURE: This brochure talks about the benefits of an archival tape management solution that can make handling requests for archive data easy and quicker while also reducing costs.
Posted: 01 Apr 2014 | Published: 31 Dec 2013

Iron Mountain

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Security and Compliance in the Cloud: What You Need to Know
sponsored by Peak 10
RESOURCE: This resource provides information about a webinar covering cloud security and compliance.
Posted: 26 Mar 2014 | Published: 18 Feb 2014

Peak 10

Archive Tape Management Made Easy
sponsored by Iron Mountain
DATA SHEET: Locating and retrieving data from thousands of tapes is time-consuming and costly. It can also create security and compliance issues. This data sheet explains a service that can make handling archive data requests easy by storing tapes offsite.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

Iron Mountain

Driving Cultural Changeto Achieve Travel andExpense Compliance in aLarge Company
sponsored by Concur Technologies
WHITE PAPER: This brief article gives advice on ways to encourage travel and expense compliance in large organizations. This is done through finding a balance between people, policy and technology.
Posted: 25 Mar 2014 | Published: 31 Oct 2013

Concur Technologies

The Intersection of SAM and Security
sponsored by CDW Corporation
WHITE PAPER: This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

CDW Corporation

10 Reasons Large CompaniesUse Automated Travel andExpense Management Solutions
sponsored by Concur Technologies
WHITE PAPER: This resources gives the most frequent reasons organizations adopt an automated travel and expense management solution. These reasons included improved security, compliance, and reduced costs.
Posted: 24 Mar 2014 | Published: 30 Sep 2013

Concur Technologies

Migrating Data to the Cloud? Have a Safe Trip.
sponsored by Peak 10
WHITE PAPER: This resource goes over some of the things to consider when moving data to the cloud. Choosing the right provider has a lot to do with the success of your storage in the cloud, and this resource provides the questions that need to be asked to make sure the right vendor is chosen.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Can the UK Find Security in US Cloud Services?
sponsored by Peak 10
WHITE PAPER: This resource goes over the facts about the UK's attitudes towards the cloud and data security and gives some insight into where the focuses will shift in the coming years.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Airlines Have the Highest Standards for Compliance - Airlines’ Sky-High Data Volumes Need Down-to-Earth Protection
sponsored by Peak 10
WHITE PAPER: This article focuses on the compliance challenges that airlines face from the various groups monitoring them and the concerns they have about the widespread use of personally identifiable information (PII).
Posted: 20 Mar 2014 | Published: 03 Mar 2014

Peak 10

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

The Expert's How-to on Vulnerability Management
sponsored by TechTarget
RESOURCE: You can never be too careful when it comes to your vulnerability management initiatives. This expert guide explores the steps your business can take to develop a data breach incident response plan and prevent data loss incidents. Also discover the five common web application vulnerabilities and how to prevent against them.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Predictive Coding: The Next Frontier in eDiscovery
sponsored by Rand Secure Data
WHITE PAPER: This resource explores your options for eDiscovery and describes how one strategy – predictive coding – is fueling eDiscovery transformation.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Rand Secure Data

What is Data Governance?
sponsored by Rand Secure Data
WHITE PAPER: This resource takes an inside look at data governance and describes the role of archiving, backup, and eDiscovery in an effective data governance strategy.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Rand Secure Data

Developing an Information Governance Strategy: An Osterman Research White Paper
sponsored by Rand Secure Data
WHITE PAPER: This resource homes in on the challenges of information governance and offers 13 key recommendations to help you improve information governance practices.
Posted: 17 Mar 2014 | Published: 28 Feb 2014

Rand Secure Data

Audits, Compliance and Security: ITPros share their experience
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper talks about a solution that allows users to better track and audit malicious or unintentional changes to their Windows environment. It gives interviews with users from various industries to see how the solution worked for them.
Posted: 10 Mar 2014 | Published: 07 Mar 2014

Dell, Inc.

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology
sponsored by CDW Corporation
WHITE PAPER: Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.
Posted: 03 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

Software Lifecycle Management: Managing Essential Enterprise Tools for Greater Productivity and Cost Savings
sponsored by CDW Corporation
WHITE PAPER: This resource is a guide to software management, and highlights key approaches that will help you ensure productivity without additional costs.
Posted: 28 Feb 2014 | Published: 30 Apr 2013

CDW Corporation

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Software Asset Management Webinar
sponsored by CDW Corporation
WEBCAST: Watch this important webcast to learn strategies and tactics you should be implementing now to ready for the inevitable software audit. Discover how to take a proactive approach to software asset management (SAM)
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape
26 - 50 of 257 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement