Software  >   Applications Software  >   Enterprise Applications Software  >  

Financial Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
Financial Compliance Software Reports
Network Purchasing Intentions 2012
sponsored by
RESEARCH CONTENT: This in-depth research from Computer Weekly and Tech-Target, reveals the IT networking trends and spending priorities for European IT professionals in 2012.
Posted: 30 Jul 2012 | Published: 30 Jul 2012

Information Governance: People, Process & Technology
sponsored by DLT Solutions
WHITE PAPER: This white paper outlines what you need to know about information governance and compliance as it relates to data storage. Read on to learn from industry experts about how backup technology can help reduce legal risks and costs for businesses.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

DLT Solutions

How To Solve The Compliance Challenge In The Cloud
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to find out how to solve the compliance challenge in cloud and virtual infrastructure environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


Use Case On-Demand Webinar:  How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso discusses best practices for reducing your sensitive data footprint. Tune in to learn how to identify a sensitive data footprint within your security environment.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

2015 Electronic Communications Compliance Survey Report
sponsored by Smarsh
WHITE PAPER: This 5th annual Electronic Communications Compliance Survey Report explores the current landscape of compliance and the emerging risks/threats.
Posted: 06 Oct 2015 | Published: 26 Aug 2015


Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

May Information Security Magazine
sponsored by
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement