IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 213 Matches Previous Page  |  Next Page
Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

Streamlining Security Identity Governance
sponsored by IBM
WHITE PAPER: Access this white paper to discover a business-centric approach to identity access and compliance that improves security and helps reduce costs for managing accounts, groups, credentials, and other access rights.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Case Study: Staying Compliant with Global Regulations
sponsored by IBM
WEBCAST: In this featured webcast, learn how one international re-insurance leader keeps compliant with global regulations such as PCIDSS and STIGs. Watch now to learn how the enterprise was able to go from monthly compliance reports to near real-time analysis or risk exposures or compliance issues.
Posted: 25 Feb 2015 | Premiered: Apr 15, 2014

IBM

Staying Compliant for On-the-Fly Investigations
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn how to make sense of all of your data and remain compliant for on-the-fly investigations.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

Dell Software

3 Step Guide for IT Governance & Compliance
sponsored by Dell Software
WHITE PAPER: This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.
Posted: 23 Feb 2015 | Published: 13 Dec 2012

Dell Software

Case Study: Essent deployes API Gateway
sponsored by Axway
WHITE PAPER: Essent, the largest energy company in the Netherlands, needed to provide an easy-to-use, secure, robust, and proven system to enable web services and mobile applications for customers, partners, employees, and the general public. Access this case study to find out which API platform Essent deployed to govern the flow of data on the edge.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Axway

Keeping Compliant in the New Digital Government
sponsored by Actiance
WHITE PAPER: In this white paper, learn the 4 questions you need to ask yourself to properly record and protect data on social media. Access now to learn insider tips to stay compliant in the public sector.
Posted: 19 Feb 2015 | Published: 12 Jun 2014

Actiance

Case Study: Storebrand Choose API Software to Secure Communications
sponsored by Axway
WHITE PAPER: Storebrand, a leader in Nordic long-term savings and insurance, needed a platform that was flexible, easy to use, and that would enable a rapid time-to-market for new integrations.Access this case study to find out how deploying API software secured communications with partners and governed the flow of data.
Posted: 19 Feb 2015 | Published: 10 Feb 2015

Axway

4 ERP Tips For FIAR Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about what it means to be in FIAR compliance and get 4 ERP tips that can help attain auditability for your business.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

Remedies for Compliant Communication and Collaboration in Healthcare Organizations
sponsored by Actiance
WHITE PAPER: Healthcare organizations should access this informative white paper to learn about the importance of keeping compliance regulations in mind when utilizing electronic communication, collaboration, and social networking tools.
Posted: 17 Feb 2015 | Published: 11 Jun 2014

Actiance

Collaboration and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: This white paper is an excellent resource for pharmaceutical companies weighing the benefits and risks of social media. Read on to learn what the pharmaceutical industry's regulatory landscape looks like, and which concerns you should be aware of from a legal perspective.
Posted: 17 Feb 2015 | Published: 11 Jul 2014

Actiance

Social Media Risks and Benefits for the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the push and pull that pharmaceutical companies feel between utilizing social networks to improve business results, and meeting the regulatory requirements of agencies like the FDA for the use of these networks.
Posted: 17 Feb 2015 | Published: 11 Jul 2014

Actiance

The Impact of New Communications in the Energy Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the use of instant messaging technology in the energy industry, explaining why monitoring, logging, and archiving these communications is a necessity for achieving compliance and protecting critical assets from cyberattacks.
Posted: 16 Feb 2015 | Published: 30 May 2014

Actiance

Cloud Governance Simplified: Policy-driven cloud IT service management
sponsored by CloudHealth Technologies
RESOURCE: Automating and optimizing IT resources based on business policies can simplify the day-to-day management of your cloud environment. Read this white paper to learn how to simplify cloud governance.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

CloudHealth Technologies

Gartner Business Process Management Summit 2015
sponsored by Gartner
WHITE PAPER: Read the Gartner Business Process Management Summit 2015 to address all of your BPM and change management concerns.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Gartner

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Extend Compliance and Risk Management to What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT: Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014

Absolute Software

Transform Your Risk, Security, and Compliance Results into Business Insight
sponsored by Allgress
WHITE PAPER: This concise white paper introduces an IT GRC suite that enables risk, security, and compliance professionals to efficiently manage their enterprise's risk posture with quick time-to-value.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Allgress

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

10 Key Elements to Focus on for Easier Systems Management
sponsored by SolarWinds, Inc.
WHITE PAPER: Is your IT infrastructure supported by hardy systems management? Or is it teetering on the edge of potential disaster? Check this featured resource to find out if your IT team is focusing on the 10 priorities of systems management, and why these could make or break your infrastructure.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

SolarWinds, Inc.

Financial Services Firm Supports Compliance with Archiving
sponsored by Hewlett-Packard Company
CASE STUDY: Learn why a leading financial institution deployed HP Digital Safe and other HP tools to help manage terabytes of data.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Hewlett-Packard Company

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to HIPAA guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast
1 - 25 of 213 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement