Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance AuditsReports
26 - 50 of 248 Matches Previous Page  | Next Page
Migrating Data to the Cloud? Have a Safe Trip.
sponsored by Peak 10
WHITE PAPER: This resource goes over some of the things to consider when moving data to the cloud. Choosing the right provider has a lot to do with the success of your storage in the cloud, and this resource provides the questions that need to be asked to make sure the right vendor is chosen.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Can the UK Find Security in US Cloud Services?
sponsored by Peak 10
WHITE PAPER: This resource goes over the facts about the UK's attitudes towards the cloud and data security and gives some insight into where the focuses will shift in the coming years.
Posted: 20 Mar 2014 | Published: 28 Feb 2014

Peak 10

Airlines Have the Highest Standards for Compliance - Airlines’ Sky-High Data Volumes Need Down-to-Earth Protection
sponsored by Peak 10
WHITE PAPER: This article focuses on the compliance challenges that airlines face from the various groups monitoring them and the concerns they have about the widespread use of personally identifiable information (PII).
Posted: 20 Mar 2014 | Published: 03 Mar 2014

Peak 10

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

The Expert's How-to on Vulnerability Management
sponsored by TechTarget
RESOURCE: You can never be too careful when it comes to your vulnerability management initiatives. This expert guide explores the steps your business can take to develop a data breach incident response plan and prevent data loss incidents. Also discover the five common web application vulnerabilities and how to prevent against them.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Predictive Coding: The Next Frontier in eDiscovery
sponsored by Rand Secure Data
WHITE PAPER: This resource explores your options for eDiscovery and describes how one strategy – predictive coding – is fueling eDiscovery transformation.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Rand Secure Data

What is Data Governance?
sponsored by Rand Secure Data
WHITE PAPER: This resource takes an inside look at data governance and describes the role of archiving, backup, and eDiscovery in an effective data governance strategy.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Rand Secure Data

Developing an Information Governance Strategy: An Osterman Research White Paper
sponsored by Rand Secure Data
WHITE PAPER: This resource homes in on the challenges of information governance and offers 13 key recommendations to help you improve information governance practices.
Posted: 17 Mar 2014 | Published: 28 Feb 2014

Rand Secure Data

Audits, Compliance and Security: ITPros share their experience
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper talks about a solution that allows users to better track and audit malicious or unintentional changes to their Windows environment. It gives interviews with users from various industries to see how the solution worked for them.
Posted: 10 Mar 2014 | Published: 07 Mar 2014

Dell, Inc.

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology
sponsored by CDW Corporation
WHITE PAPER: Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.
Posted: 03 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

Software Lifecycle Management: Managing Essential Enterprise Tools for Greater Productivity and Cost Savings
sponsored by CDW Corporation
WHITE PAPER: This resource is a guide to software management, and highlights key approaches that will help you ensure productivity without additional costs.
Posted: 28 Feb 2014 | Published: 30 Apr 2013

CDW Corporation

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Software Asset Management Webinar
sponsored by CDW Corporation
WEBCAST: Watch this important webcast to learn strategies and tactics you should be implementing now to ready for the inevitable software audit. Discover how to take a proactive approach to software asset management (SAM)
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

Streamline Software Asset Management, Compose a software Management Symphony
sponsored by CDW Corporation
WEBCAST: View this webcast to explore a software asset management solution with customized application inventory reporting that enables you to easily assess software licenses and reduce compliance risks and costs.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

CDW Corporation

The 3 Most Common Compliance Regulations
sponsored by Celestix Networks
WHITE PAPER: This resource highlights the most common requirements and best practices for today's compliance mandates.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

Celestix Networks

PCI DSS 3.0: The Expert's Guide to the New Guidance
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com Editorial TechGuide gives an overview of the major changes with PCI DSS 3.0, outlines where procedures and policies remain unclear, and closes with a practical list of the top five ways this new standard affects merchants.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 25 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013

Infoblox

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia
26 - 50 of 248 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement