Compliance reporting software

RSS Feed    Add to Google    Add to My Yahoo!
Compliance reporting softwareReports
26 - 50 of 54 Matches Previous Page  | Next Page
Using Predictive Coding to Your E-Discovery Advantage
sponsored by SearchCIO.com
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

SearchCIO.com

A Practical Guide to Records Management in the Digital Era
sponsored by Iron Mountain
WHITE PAPER: Making the transition to digital management of paper and electronic records is challenging. Companies can't risk efficiency or accuracy with their data, and may need a more simplified approach during the transition. View this resource to uncover a more practical approach to records management in the digital era.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Iron Mountain

Total Quality Assurance for Businesses with a Global Business Plan
sponsored by IFS
WHITE PAPER: Establishing a business that is competitive on a global spectrum can be challenging. View this white paper to learn more about how you can deploy a complete quality assurance package that provides the support your business needs. It outlines what you should be looking for in a source so you can be certain you've made the right selection.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

IFS

Survive the Scrutiny of Litigation:Rediscover Records Management
sponsored by Iron Mountain
EBOOK: Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management.
Posted: 28 Aug 2012 | Published: 27 Aug 2012

Iron Mountain

Creating a Compliance Culture: Best Practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report
sponsored by ComputerWeekly.com
WHITE PAPER: This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy, G-Cloud & Government Applications Store Programme Phase 2
sponsored by ComputerWeekly.com
WHITE PAPER: At the core of the programme is the vision of providing political, business and ICT leaders with greatly improved agility, flexibility and choice in the ICT that enables the public sector and to deliver substantial cost savings on both existing and new ICT services.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

IT Jobswatch - Financial Services
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by software houses and consultancies is up by 8.1%. The growth in demand for IT staff in this sector shows 27.3% more vacancies being advertised than a year ago.
Posted: 21 Oct 2011 | Published: 11 Feb 2011

ComputerWeekly.com

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

Enterprise Security: Why you need Effective Log Management
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

Energy Intelligence Driving Optimization with Visibility
sponsored by SAP America, Inc.
WHITE PAPER: Aberdeen research report on how best in class companies utilize and leverage energy management technology while outpeforming their peers.
Posted: 23 Apr 2012 | Published: 31 Jul 2011

SAP America, Inc.

Fixed Asset Inventory: A Guide to Getting Started
sponsored by Sage Software
WHITE PAPER: Deployment of a fixed asset management provides countless benefits ranging from prevention of overpayment on property tax and insurance, to  reducing the risk of non-compliance with Sarbanes-Oxley Act. Read this paper to learn about best practices for fixed asset inventory management and tips for implementing a successful inventory process.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Sage Software

IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE: As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

HP Enterprise Security

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX
sponsored by Safestone Technologies
WHITE PAPER: This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Safestone Technologies

RAPID-DEPLOYMENT SOLUTIONS FOR SUSTAINABILITY ANALYTICS
sponsored by SAP America, Inc.
WHITE PAPER: Minimizing losses from accidents, products losses, and violations of environmental regulations requires rapid access to the right information. Read this paper to learn to how to leverage sustainability analytics that let you import data from SAP and non-SAP applications for the needed visibility.
Posted: 28 Oct 2011 | Published: 31 Dec 2010

SAP America, Inc.

Information Retention and eDiscovery Survey
sponsored by Symantec Corporation
WHITE PAPER: This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.
Posted: 18 Oct 2011 | Published: 17 Oct 2011

Symantec Corporation

RSD Glass
sponsored by RSD
WHITE PAPER: Read this brief, yet helpful fact sheet on information governance to stay ahead of your compliance issues.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

RSD

Overview of RSD Glass
sponsored by RSD
WHITE PAPER: This white paper includes valuable information about information governance along with a solution to many governance challenges.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

RSD

Planning, Implementing, and Maintaining: Successful, Cost-Effective Virtualization Initiatives
sponsored by BDNA
WHITE PAPER: Virtualization is now a key strategic initiative. But without a holistic vision of the entire infrastructure, its true potential will not be met. Read now to discover the value of tools that simultaneously manage your entire infrastructure, both physical and virtual.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

BDNA

Understanding and Selecting a File Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER: Imagine having a tool to detect an administrator suddenly copying the entire directory containing the latest engineering plans, or a user with rights to a file outside their business unit accessing it for the first time in 3 years.
Posted: 20 May 2011 | Published: 16 May 2011

Imperva

Scalability in Log Management
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper will take you through the process of selecting a log management solution for your organization. It will provide you with information about log management, as well as the requirements you should be looking for in a log management solution.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.
26 - 50 of 54 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement