Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software Reports
1 - 25 of 189 Matches Previous Page  |  Next Page
The Role of Third-Party Tools for Office 365 Compliance
sponsored by Good Technology
WHITE PAPER: This white paper explores the compliance challenges and limitations in Office 365. Access this exclusive paper to enhance your compliance capabilities with several third-party tools like containerized mobility, data residency protection, and more.
Posted: 24 Nov 2015 | Published: 30 Jun 2015

Good Technology

Inflexible ERP: The High Cost of Business Disruption
sponsored by Unit4
WHITE PAPER: Access this brief but informative infographic to learn how common business changes affect ERP spending, and the pain-points you need to address the most.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Stealth Compliance Strategies
sponsored by Unisys
WHITE PAPER: Access this guide to find software-defined security strategies that help government and commercial enterprises prevent highly sensitive data, systems, and intellectual property from being compromised.
Posted: 20 Nov 2015 | Published: 30 Jun 2015


Extensive Compliance Automation Through an Integrated Security Information Event Management Platform
sponsored by AccelOps Inc.
WHITE PAPER: Access this white paper to examine a comprehensive SIEM platform that cuts through operational silos and disparate infrastructures to yield unparalleled visibility, expedited incident response, efficient forensics, and audit assurance while also providing broad verification of controls and compliance documentation.
Posted: 19 Nov 2015 | Published: 30 Dec 2011

AccelOps Inc.

Modernizing Your Active Directory Environment
sponsored by Dell Software
WHITE PAPER: Access this white paper and find out how legacy active directory (AD) structures can be updated to accommodate changes in technology. Discover top areas in which AD modernization should occur, and the benefits of updating each one.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Dell Software

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015

LogRhythm, Inc.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Keeping Air Traffic Controllers Informed with a Cloud-Based Compliance Application
sponsored by Microsoft
WHITE PAPER: In this white paper, learn how NAC CANADA was able to streamline compliance by automating a necessary, but mostly manual and paper-based read-and-acknowledge process. Read on to learn about the cloud platform they chose, and the benefits it provided.
Posted: 11 Nov 2015 | Published: 31 Mar 2015


Cloud Application Discovery, SSO, and Threat Prevention for Cloud Apps
sponsored by IBM
VIDEO: Watch this video, to hear about strategies for tackling cloud security challenges from cloud security expert Ravi Srinivasan.
Posted: 11 Nov 2015 | Premiered: 22 Sep 2015


Securing, Categorizing, and Archiving Digital Photographs, Images and Videos
sponsored by Unisys
WHITE PAPER: This solution brief sheds light on image processing services that assist with managing, storing and securing images. Take a look and discover answers to common video, image, and audio securing questions.
Posted: 10 Nov 2015 | Published: 30 Sep 2015


The New Cloud Security Hero
sponsored by IBM
VIDEO: The following webinar features insights from industry leaders on the latest in cloud security developments. Learn three key ways to address your cloud security issues.
Posted: 10 Nov 2015 | Premiered: 10 Nov 2015


From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


How to Meet Compliance for Electronic Communications
sponsored by Smarsh
WHITE PAPER: This white paper examines the latest strategies for meeting electronic communications compliance across email and social media.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


Cloud Risk and Compliance
sponsored by
VIRTUAL ENVIRONMENT: This classroom examines the key cloud concerns and how to work with cloud service providers to ensure the safety of sensitive corporate assets.Moving enterprise workloads and data to the cloud doesn't remove IT's responsibility for security and regulation compliance.
Posted: 05 Nov 2015 | Premiered: 13 Oct 2015

Advanced, Efficient, and Trusted Security Practices
sponsored by Unisys
DATA SHEET: In this solution brief, you'll discover ways to address threats with new approaches that give you the security, affordability, and management control you need today. Access now and find answers to your most pertinent security questions.
Posted: 05 Nov 2015 | Published: 30 Sep 2015


Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.

Why The Bank You Know Today Will Disappear
sponsored by SAP
WHITE PAPER: In this white paper, read about 3 key areas where banks are lagging behind, and how banks can improve customer experience, collaboration, and agility to effectively function in today's digital landscape.
Posted: 05 Nov 2015 | Published: 21 Sep 2015


Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Don't Let PCI Compliance Get in the Way of Productivity
sponsored by Unisys
WHITE PAPER: Most businesses struggle to maintain payment card industry (PCI) compliance while also enabling business efficiency. This white paper can help you find that balance.
Posted: 15 Oct 2015 | Published: 15 Oct 2015


Aggravation or Aggregation: Risk Data and Compliance
sponsored by SAS
WHITE PAPER: Access this survey now to uncover best practices that your bank may use as a guide in formulating a response to comply with BCBS 239 principles. Read on to learn more.
Posted: 14 Oct 2015 | Published: 31 Dec 2014


Best Practices for Classification Techniques and Data Protection
sponsored by Identity Finder, LLC
WEBCAST: In this webinar, Forrester senior analyst Heidi Shey reveals how to turn your data classification project into a success. Tune in and learn how to protect sensitive data types beyond the realm of what is considered regulated.
Posted: 12 Oct 2015 | Premiered: Jun 24, 2015

Identity Finder, LLC

Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Navigate The Future Of Identity And Access Management
sponsored by Covisint
WHITE PAPER: In this Forrester Report, discover analysts' revelations about how to support new initiatives in an increasingly competitive business environment with superior security.
Posted: 08 Oct 2015 | Published: 03 Aug 2015

Information Governance: People, Process & Technology
sponsored by DLT & Veritas
WHITE PAPER: This white paper outlines what you need to know about information governance and compliance as it relates to data storage. Read on to learn from industry experts about how backup technology can help reduce legal risks and costs for businesses.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

DLT & Veritas

2015 Electronic Communications Compliance Survey Report
sponsored by Smarsh
WHITE PAPER: This 5th annual Electronic Communications Compliance Survey Report explores the current landscape of compliance and the emerging risks/threats.
Posted: 06 Oct 2015 | Published: 26 Aug 2015

1 - 25 of 189 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement