Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Management Software Reports
 
RACQ: Audit Scare Led to Software Cost Containment Drive
sponsored by Snow Software
CASE STUDY: Read on to analyze how one software asset management (SAM) tool empowers organizations to strategically manage, optimize and contain software costs—taking the guesswork out of understanding license positions, and enabling businesses to respond to renewals and audits promptly.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Snow Software

Blue Coat Cloud Data Protection Gateway
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to ensure CJIS compliance when using Salesforce.com and other SaaS applications to maintain control over your data on the cloud. Discover the benefits of this approach such as FIPS-140 compliance, seamless user experience, and more.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

Symantec & Blue Coat Systems

Snow ensures license optimization is plain sailing for Ferretti Group
sponsored by Snow Software
WHITE PAPER: Today it's nearly impossible to keep up with all of the different licensing requirements that come with each software the average small to medium sized business uses. Access this short case study for information on how one yacht manufacturer was able to implement a Software Asset Management tool to manage their complex licensing metrics.
Posted: 07 Mar 2017 | Published: 12 Sep 2016

Snow Software

Agora uses Snow Software for continuous license optimization
sponsored by Snow Software
WHITE PAPER: Agora, one of the largest media companies in Poland, is worried about a software vendor audit and needed a tool to keep track of all of its licensing compliance requirements. Read this case study for information on the software asset management tool that Agora used to gain 180% ROI in less than six months on reallocating unused licenses.
Posted: 08 Mar 2017 | Published: 31 Dec 2016

Snow Software

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Using Predictive Coding to Your E-Discovery Advantage
sponsored by SearchCIO.com
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

SearchCIO.com

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Closed-loop Records Management: The Stakes Are Too High to Ignore
sponsored by RSD
WHITE PAPER: As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

RSD

PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

DellEMC and Intel®

Aggravation or Aggregation: Risk Data and Compliance
sponsored by SAS
WHITE PAPER: Access this survey now to uncover best practices that your bank may use as a guide in formulating a response to comply with BCBS 239 principles. Read on to learn more.
Posted: 14 Oct 2015 | Published: 31 Dec 2014

SAS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement