Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software Reports
76 - 100 of 190 Matches Previous Page  |  Next Page
Global profiles of the fraudster
sponsored by
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

CW500: Best practice in BYOD
sponsored by
PRESENTATION: Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

Tips to Develop the Right Retention Schedule for your Organization
sponsored by
WHITE PAPER: Check in with the experts at to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

Protecting Data in Physical and Virtual Infrastructures
sponsored by IBM
WHITE PAPER: This paper explains how protections should be built into virtual and cloud environments from the start with the goal of helping organizations demonstrate compliance. Find out the criteria you should consider when choosing a data security tool.
Posted: 04 Apr 2013 | Published: 30 Apr 2012


IT Services Purchase Intentions 2013
sponsored by
ESSENTIAL GUIDE: This survey of over 130 European IT professionals from Computer Weekly and TechTarget examines company's buying plans for IT services in 2013.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

Where is the smart money going in ICT ?
sponsored by
WHITE PAPER: Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment.
Posted: 29 Nov 2012 | Published: 24 Mar 2011

APTARE StorageConsole Backup Manager
sponsored by APTARE
DATA SHEET: This informative paper examines a backup and recovery software solution that can help you increase your backup and restore success, streamline compliance, improve backup performance and much more. Read on to learn more.
Posted: 25 Oct 2013 | Published: 30 Aug 2013


Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013


6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013


Using a Gateway to achieve PCI compliance
sponsored by Forum Systems
WHITE PAPER: This exclusive resource examines a gateway product that can help your organization achieve PCI compliance.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Forum Systems

Rules, risk and the potential for profit in the world of Basel III
sponsored by IBM
WHITE PAPER: Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III
Posted: 30 Sep 2013 | Published: 30 Sep 2013


An insurance firm eases regulatory compliance while reducing risk
sponsored by IBM
WHITE PAPER: Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
Posted: 13 Sep 2013 | Published: 13 Sep 2013


CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013


Understanding the Data Management Challenges of Dodd-Frank
sponsored by Bloomberg
PRESENTATION TRANSCRIPT: Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.
Posted: 03 Jun 2013 | Published: 03 Jun 2013


Using Predictive Coding to Your E-Discovery Advantage
sponsored by
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

May Information Security Magazine
sponsored by
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Enterprise Security: Why you need Effective Log Management
sponsored by
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation
76 - 100 of 190 Matches Previous Page    2 3 4 5 6 7    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement