Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance AuditsReports
51 - 75 of 284 Matches Previous Page  | Next Page
The Benefits of RSD Glass
sponsored by RSD
WHITE PAPER: Consult the following white paper to explore an information governance platform that strategically keeps the records you need to grow your business while safely disposing unnecessary records, ultimately reducing storage costs, minimizing audits, and more.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

RSD

Simplify Information Governance for SharePoint
sponsored by RSD
WHITE PAPER: The following white paper explores how an information governance solution can effectively manage all information created in SharePoint without having to migrate other long term archiving systems.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

RSD

What can RSD Glass do for your IG strategy?
sponsored by RSD
PRODUCT OVERVIEW: Access the following solution overview to explore an information governance platform that skillfully keeps the records you need to grow your business while safely disposing unnecessary records, ultimately reducing storage costs, minimizing audits, and more.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

RSD

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

The Dynamic Duo: SAM & Security
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Software Asset Management: Pay Attention or Pay Up
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

HANDLE YOUR ACHIVE DATA CONFIDENTLY AND COST-EFFECTIVELY
sponsored by Iron Mountain
BROCHURE: This brochure talks about the benefits of an archival tape management solution that can make handling requests for archive data easy and quicker while also reducing costs.
Posted: 01 Apr 2014 | Published: 31 Dec 2013

Iron Mountain

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Archive tape management made easy: Cut complexities and costs to better handle data requests
sponsored by Iron Mountain
DATA SHEET: Locating and retrieving data from thousands of tapes is time-consuming and costly. It can also create security and compliance issues. This data sheet explains a service that can make handling archive data requests easy by storing tapes offsite.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

Iron Mountain

The Intersection of SAM and Security
sponsored by CDW Corporation
WHITE PAPER: This informative paper explains how effective management of software assets can not only prevent problems during an audit but also improve security posture. It also gives tips on ways to make sure a SAM solution doesn't become too complex.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

CDW Corporation

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

The Expert's How-to on Vulnerability Management
sponsored by TechTarget
RESOURCE: How can enterprises get a better handle on vulnerabilities and ensure security issues aren't overlooked? With you in mind, we've created The Expert's How-to on Vulnerability Management which explores the steps you can take to develop a data breach incident response plan, the top five Web application vulnerabilities, and how to circumvent them.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

PCI DSS 3.0: The Expert's Guide to the New Guidance
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com Editorial TechGuide gives an overview of the major changes with PCI DSS 3.0, outlines where procedures and policies remain unclear, and closes with a practical list of the top five ways this new standard affects merchants.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

7 Ideas to Improve Network Security in Healthcare
sponsored by Palo Alto Networks
WEBCAST: View this webcast to reveal 7 critical steps to improve healthcare IT security despite increasing network complexities.
Posted: 27 Dec 2013 | Premiered: Sep 30, 2013

Palo Alto Networks

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Expenses, VAT and HMRC Compliance in a Nutshell
sponsored by Concur Technologies
WHITE PAPER: 75% of senior finance leaders say they wish they knew more about employee expenses and VAT reclaim. If you're a member of that overwhelming population, then this e-book is for you. Download now to get a crash course on the often-misunderstood concepts of VAT, compliance, HMRC policies, and expenses.
Posted: 01 Apr 2014 | Published: 30 Nov 2013

Concur Technologies

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Real-world Identity and Access Management (IAM) for Unix-based Systems
sponsored by Dell Software
WHITE PAPER: Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.
Posted: 03 Mar 2014 | Published: 04 Mar 2013

Dell Software

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology
sponsored by CommVault Systems, Inc.
WHITE PAPER: Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.
Posted: 03 Mar 2014 | Published: 06 Mar 2014

CommVault Systems, Inc.

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro
51 - 75 of 284 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement