Business of Information Technology  >   Business Management  >   Financial Management  >   Auditing (Finance)  >  

Financial Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Financial Compliance Reports
 
Case Study: Hyundai Department Store Group
sponsored by Symantec & Blue Coat Systems
CASE STUDY: Hyundai Department Store Group faced the challenges of needing to comply with the South Korean Personal Information Protection Act and put customers at ease that their personal information would be protected. In this case study, explore how Hyundai overcame this issue by implementing data loss prevention strategies.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Symantec & Blue Coat Systems

The 2017 Veritas GDPR Report - Think you are Ready for GDPR- Think again
sponsored by Veritas
RESOURCE: Only 2% of companies meet GDPR compliance criteria. Where are organizations going wrong? Explore this infographic to reveal statistics regarding GDPR compliance and learn GDPR requirements your organization needs to follow to ensure readiness for the deadline.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Veritas

The Value of Cloud ERP to Your Business
sponsored by NetSuite
WHITE PAPER: Finding the right ERP strategy is critical because it helps perform and improve critical functions like automating core business operations, improving financial compliance, enhancing customer service, and more. Access this buyer's guide to help decide if on-premise ERP is right for your needs or if it's time to consider migrating to the cloud.
Posted: 13 Oct 2016 | Published: 31 Dec 2015

NetSuite

The Perfect Rx for HIPAA Compliance
sponsored by AlienVault
WHITE PAPER: Complying with HIPAA's Security Rule and to demonstrate that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

The Data Governance Keys to Successful GRC Automation
sponsored by SearchCompliance.com
EBOOK: Automated compliance processes can cut costs and create smoother compliance workflows, but they can be challenging to integrate with a company's governance strategies. In this SearchCompliance handbook, learn strategies to deploy automated GRC processes that support existing data governance objectives.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SearchCompliance.com

How a Top 10 Bank Uses A Data Analytics Tool to Manage Operational Risk
sponsored by Infogix
WHITE PAPER: In this case study, learn about the analytics tool a top 10 U.S. Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including reduced costs while increasing productivity, processed full audit in real time, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2014

Infogix

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement