Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance SoftwareReports
76 - 100 of 158 Matches Previous Page  | Next Page
Analyst's take: Benefits of Alpha ImageWorks 9000 for healthcare providers
sponsored by ComputerWeekly.com
WHITE PAPER: Alpha ImageWorks 9000 centralizes patient records into a single, secure repository, providing easy access, accelerated processing time and billing, and significant time saving in reviewing patient records.
Posted: 24 Oct 2011 | Published: 24 Jan 2011

ComputerWeekly.com

Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report
sponsored by ComputerWeekly.com
WHITE PAPER: This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy G-Cloud and The Applications Store for Government - Commercial Strategy Team
sponsored by ComputerWeekly.com
WHITE PAPER: The commercial potential of cloud computing and cloud services is widely accepted, both in private industry and in the public sector.  The opportunities for cost reduction and efficiency in the UK public sector are real and achievable, but require significant changes to procurement practices, delivery frameworks and across the supplierlandscape.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Founding Principles
sponsored by ComputerWeekly.com
WHITE PAPER: The overriding goals for Data Centre Consolidation, the G-Cloud and the Applications Store for Government are:Reduce ICT costs;Provide open competition and create a vibrant marketplace enabling the best product at the best price;Create flexibility.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Implementation Strategy
sponsored by ComputerWeekly.com
WHITE PAPER: The Data Centre Strategy, G-Cloud and Applications Store for Government Programme (hereafter the „G-Cloud Programme‟) are 3 of the 14 strands of the Government ICT Strategy.Phase 2 of the programme started in October 2009 and ran until the middle of February 2010.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy, G-Cloud & Government Applications Store Programme Phase 2
sponsored by ComputerWeekly.com
WHITE PAPER: At the core of the programme is the vision of providing political, business and ICT leaders with greatly improved agility, flexibility and choice in the ICT that enables the public sector and to deliver substantial cost savings on both existing and new ICT services.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Analyst's take: Scheduling applications cut healthcare costs
sponsored by ComputerWeekly.com
WHITE PAPER: By deploying advanced scheduling tools, healthcare institutions can reduce labor costs and improve the productivity of schedulers, staffers, and caregivers.
Posted: 20 Oct 2011 | Published: 11 Mar 2011

ComputerWeekly.com

CW+: Bloor Research - EU Compliance and Regulations for the IT Professional
sponsored by ComputerWeekly.com
WHITE PAPER: This paper highlights key directives and legislation within the European Union that have an impact on IT security practitioners, especially those responsible for the safe storage of data using data loss prevention technologies.
Posted: 20 Oct 2011 | Published: 06 Jan 2011

ComputerWeekly.com

RSD Glass
sponsored by RSD
WHITE PAPER: Read this brief, yet helpful fact sheet on information governance to stay ahead of your compliance issues.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

RSD

Overview of RSD Glass
sponsored by RSD
WHITE PAPER: This white paper includes valuable information about information governance along with a solution to many governance challenges.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

RSD

Charting the way for the Information Governance imperative
sponsored by RSD
WHITE PAPER: Read this white paper to learn more about how to reach compliance guidelines and better secure your most important information.
Posted: 26 Sep 2011 | Published: 26 Sep 2011

RSD

The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 31 Aug 2011 | Published: 30 Aug 2011

Dell Software

Presentation Transcript: Addressing the Challenges of Enterprise Data Management – An Integrated Approach with IBM® Optim™
sponsored by Advent Global Solutions Inc.
PRESENTATION TRANSCRIPT: This transcript of a presentation by Subash Chaganty outlines data management challenges that modern enterprises face and outlines ways in which IBM Optim, a database management system (DBMS), can help address them.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

Advent Global Solutions Inc.

Collab Net Success Story
sponsored by CollabNet
CASE STUDY: Discover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

CollabNet

What Every Enterprise Should Know About Cloud Computing and eDiscovery
sponsored by Proofpoint, Inc.
WHITE PAPER: This paper offers guidelines for evaluating cloud service providers and for defining SLAs that meet the business and IT goals of cloud computing as well as the legal requirements for eDiscovery
Posted: 12 Jul 2011 | Published: 12 Jul 2011

Proofpoint, Inc.

Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
sponsored by Mainline Information Systems
PRESENTATION TRANSCRIPT: This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
Posted: 17 Jun 2011 | Published: 16 Jun 2011

Mainline Information Systems

BDNA for Security: Strengthened Security Through Visibility
sponsored by BDNA
WHITE PAPER: Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

BDNA

Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance
sponsored by Oracle Corporation
WHITE PAPER: When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
sponsored by IBM
EGUIDE: This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company
sponsored by IBM
CASE STUDY: InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

IBM

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011

Safestone Technologies

Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

RSA Solution for Cloud Security and Compliance
sponsored by RSA, The Security Division of EMC
WEBCAST: This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Posted: 23 Dec 2010 | Premiered: Dec 23, 2010

RSA, The Security Division of EMC

The Ten Best Practices for Secure Software Development
sponsored by ISC2
WHITE PAPER: Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software.
Posted: 15 Dec 2010 | Published: 15 Dec 2010

ISC2
76 - 100 of 158 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement