Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance AuditsReports
26 - 50 of 280 Matches Previous Page  | Next Page
Revolutionizing Home Entertainment
sponsored by Adobe EchoSign
CASE STUDY: The following case study explores how by leveraging Adobe EchoSign, TiVo was able to remove days off their contract lifecycle, increased control and visibility into the workflow, as well as improved audit trails for their internal records. Read on to learn how you can achieve similar results.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Adobe EchoSign

Mastering software license compliance to reduce costs
sponsored by Hewlett-Packard Company
WEBCAST: Software license management and software asset management (SAM) are common pain points for many organizations. In this webcast, learn how to simplify and optimize SAM with the right technology and the right processes, as well as how to better prepare for the inevitable audit.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Accurately assessing economic capital with IBM Algorithmics and IBM Platform Computing
sponsored by IBM
CASE STUDY: The following case study explores the solution that allowed for a leading financial services company to more accurately assess capital requirements, risk management, deploy complex simulations, and more to ultimately reach Solvency II compliance and improved business performance.
Posted: 23 May 2014 | Published: 23 May 2014

IBM

The Capabilities and Benefits of Enhanced File Transfer (EFT)
sponsored by GlobalScape
WHITE PAPER: This resource features a military-grade file transfer solution that ensures compliance with internal security policies and government regulations.
Posted: 23 May 2014 | Published: 31 Dec 2013

GlobalScape

Understand Your Data to Identify Issues in the File Transfer Process— and Move Forward
sponsored by GlobalScape
WHITE PAPER: This resource highlights a file transfer platform that offers complete visibility to help improve security and audit management.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

5 Cornerstones of Compliance
sponsored by Datto, Inc.
WHITE PAPER: This resource highlights the 5 cornerstones of compliance and gives you the facts on a security strategy designed to meet a diverse set of MSP needs.
Posted: 16 May 2014 | Published: 31 Dec 2013

Datto, Inc.

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

CommVault Systems, Inc.

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

Improving Security with GRC Best Practices
sponsored by TechTarget
RESOURCE: Although they have many of the same goals, an organization's compliance and security departments usually do not work together enough to meet common objectives. Take this 2 minute survey and gain access to this eguide which outlines essential guidelines for improving security with governance, risk and compliance best practices.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

TechTarget

RSD Glass: Enabling Defensible Disposition of Information
sponsored by RSD
WHITE PAPER: The following resource explores the importance of having the right information governance strategy in place to ensure a defensible disposition, ultimately allowing the disposal of the right records, significantly reduced storage costs, mitigate risk, and more.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

RSD

Importance of Information Governance for Records Managers
sponsored by RSD
WHITE PAPER: The following white paper explores the importance of information governance for records managers today. Uncover a solution to today's information governance needs and how a successful initiative can minimize risk, improve the value of information, and more.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

RSD

The Benefits of RSD Glass
sponsored by RSD
WHITE PAPER: Consult the following white paper to explore an information governance platform that strategically keeps the records you need to grow your business while safely disposing unnecessary records, ultimately reducing storage costs, minimizing audits, and more.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

RSD

Simplify Information Governance for SharePoint
sponsored by RSD
WHITE PAPER: The following white paper explores how an information governance solution can effectively manage all information created in SharePoint without having to migrate other long term archiving systems.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

RSD

What can RSD Glass do for your IG strategy?
sponsored by RSD
PRODUCT OVERVIEW: Access the following solution overview to explore an information governance platform that skillfully keeps the records you need to grow your business while safely disposing unnecessary records, ultimately reducing storage costs, minimizing audits, and more.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

RSD

Transferring Data without Secure Protocols?
sponsored by GlobalScape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

GlobalScape

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.
26 - 50 of 280 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement