Compliance reporting software

RSS Feed    Add to Google    Add to My Yahoo!
Compliance reporting softwareReports
1 - 25 of 54 Matches Previous Page  | Next Page
Importance of Information Governance for Records Managers
sponsored by RSD
WHITE PAPER: The following white paper explores the importance of information governance for records managers today. Uncover a solution to today's information governance needs and how a successful initiative can minimize risk, improve the value of information, and more.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

RSD

Predictive Coding: The Next Frontier in eDiscovery
sponsored by Rand Secure Data
WHITE PAPER: This resource explores your options for eDiscovery and describes how one strategy – predictive coding – is fueling eDiscovery transformation.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Rand Secure Data

Audits, Compliance and Security: ITPros share their experience
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper talks about a solution that allows users to better track and audit malicious or unintentional changes to their Windows environment. It gives interviews with users from various industries to see how the solution worked for them.
Posted: 10 Mar 2014 | Published: 07 Mar 2014

Dell, Inc.

Whitepaper on eDiscovery & Compliance for Edge data that is in process
sponsored by CommVault Systems, Inc.
DATA SHEET: This informative datasheet gives information on two solutions that can help organizations handle their own compliance and discovery workflows without the help (and expense) of outside consultants.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

CommVault Systems, Inc.

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

5 eDiscovery Challenges Solved
sponsored by CommVault Systems, Inc.
WHITE PAPER: This quick solution brief addresses the top 5 eDiscovery obstacles that stand in your way.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

CommVault Systems, Inc.

Mom, Apple Pie, and the Office of Comptroller of the Currency
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

Streamline Software Asset Management, Compose a software Management Symphony
sponsored by CDW Corporation
WEBCAST: View this webcast to explore a software asset management solution with customized application inventory reporting that enables you to easily assess software licenses and reduce compliance risks and costs.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

CDW Corporation

Breaking Through The Value Ceiling
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, gain information to determine whether your governance, risk and compliance (GRC) tools have yet to maximize their full value, and discover 3 ways that you can go beyond to bring significant ROI.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

RSA, The Security Division of EMC

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Ease GLBA Compliance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs.
Posted: 03 Sep 2013 | Published: 07 May 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

Tips to develop the right retention schedule for your organization
sponsored by SearchCIO.com
WHITE PAPER: Developing record retention schedules can help companies track legal and regulatory data, ensuring that critical information is properly maintained.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

SearchCIO.com

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Advances in Financial Disclosure and Risk Management
sponsored by IBM
WEBCAST: This on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.
Posted: 01 Nov 2013 | Premiered: Feb 5, 2013

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

An insurance firm eases regulatory compliance while reducing risk
sponsored by IBM
WHITE PAPER: Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

IBM

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault
1 - 25 of 54 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement