Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance SoftwareReports
126 - 150 of 186 Matches Previous Page  | Next Page
Log Management: How to Develop the Right Strategy for Business and Compliance
sponsored by Dell SecureWorks
WHITE PAPER: Organisations need a business-based approach to creating a log management strategy that will help them detect attacks, deal with mounds of data collected by network and security devices, and meet compliance requirements. This white paper will outline a five step process which will help reduce the complexity of this process.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
sponsored by IBM
PRODUCT LITERATURE: High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
Posted: 03 May 2010 | Published: 03 Feb 2010

IBM

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

RSA Solution for Cloud Security and Compliance
sponsored by RSA
WEBCAST: This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Posted: 23 Dec 2010 | Premiered: Dec 23, 2010

RSA

The Ten Best Practices for Secure Software Development
sponsored by ISC2
WHITE PAPER: Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software.
Posted: 15 Dec 2010 | Published: 15 Dec 2010

ISC2

Validation Process and Compliance Support with IBM Maximo Asset Management in Regulated Industries
sponsored by IBM
WHITE PAPER: While there is no single method to guarantee software compliance, IBM Maximo® Asset Management can provide e-signature and e-record (audit trail) capabilities that support efforts to comply with regulations and guidelines related to e-records and e-signatures.
Posted: 08 Dec 2010 | Published: 08 Dec 2010

IBM

Examining Control System Security and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper will provide an overview of cyber threats and regulations within critical infrastructure specific to control system environments. The paper will then present a general overview of control system architecture and identify common vulnerabilities within these environments.
Posted: 30 Nov 2010 | Published: 30 Nov 2010

ArcSight, an HP Company

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE: While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010

ArcSight, an HP Company

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
sponsored by BWise
EGUIDE: This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

BWise

Effective Log Management for the IBM Power Systems (i, AIX, Linux)
sponsored by Safestone Technologies
WHITE PAPER: This paper will discuss the benefits of using a log management solution to ensure compliance in virtual environments and the features a good solution should provide your organization.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

SearchSecurity.com

E-Book: Red Flag Rules Compliance
sponsored by Gemalto
EBOOK: SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Gemalto

Creating a Dynamic Information Infrastructure
sponsored by IBM
WHITE PAPER: Discussions with customers and research into vendor offerings are the basis of this white paper. It prescribes a customer transformation roadmap, profiles two customers’ information infrastructure journeys, and provides an analysis of IBM’s and EMC’s associated visions and strategies.
Posted: 06 Aug 2010 | Published: 17 Sep 2009

IBM

Impact Brief: How to Get Started with Enterprise Risk Management
sponsored by RSA
WHITE PAPER: To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

RSA

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention
sponsored by Trend Micro, Inc.
CASE STUDY: When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Case Study: WebEx - Securing Web Collaboration
sponsored by Qualys
CASE STUDY: Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
Posted: 18 May 2010 | Published: 18 May 2010

Qualys

Process Automation With VMware
sponsored by UC4 Software, Inc
WHITE PAPER: In this white paper, you’ll discover how to grapple virtualization's complexities by automating time drains like on/off control, making backups and snapshots, and provisioning resources (virtual machines).
Posted: 08 Feb 2010 | Published: 08 Feb 2010

UC4 Software, Inc

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
sponsored by SearchCompliance.com
EBOOK: Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

SearchCompliance.com

Avoiding 7 Common Mistakes of IT Security Compliance
sponsored by Qualys, Inc.
EGUIDE: This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals.
Posted: 21 Oct 2009 | Published: 01 Apr 2009

Qualys, Inc.

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance
sponsored by Mimecast
WHITE PAPER: Read this paper and learn how a successful data leak prevention system can protect your business from internal threats in this age of regulatory compliance, risk, and governance.
Posted: 07 Oct 2009 | Published: 15 Dec 2008

Mimecast

Guide: Enterprise Security Reporter
sponsored by ScriptLogic Corporation
WHITE PAPER: In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

The New Age of Compliance: Preparing Your Organization for a New Era of Increased Accountability and Enforcement
sponsored by Mimosa Systems
WHITE PAPER: This white paper examines the current state of regulatory compliance and the impact of non-compliance. It also addresses the current political environment and the shift in the compliance landscape and compliance enforcement for which organizations need to be prepared. Finally, it discusses some best practices that can be applied to streamline..
Posted: 06 Jul 2009 | Published: 10 Jun 2009

Mimosa Systems

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data
sponsored by Bit9, Inc.
WHITE PAPER: As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance...
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation
126 - 150 of 186 Matches Previous Page    4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement