IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 203 Matches Previous Page  |  Next Page
Extend Compliance And Risk Management To What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT: Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014

Absolute Software

Engage Audit Professionals for Better Security Assessment Outcomes
sponsored by IBM
WHITE PAPER: This white paper explains how to leverage your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program
Posted: 22 Jan 2015 | Published: 26 Jun 2013

IBM

Transform Your Risk, Security, and Compliance Results into Business Insight
sponsored by Allgress
WHITE PAPER: This concise white paper introduces an IT GRC suite that enables risk, security, and compliance professionals to efficiently manage their enterprise's risk posture with quick time-to-value.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Allgress

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

10 Key Elements to Focus on for Easier Systems Management
sponsored by SolarWinds, Inc.
WHITE PAPER: Is your IT infrastructure supported by hardy systems management? Or is it teetering on the edge of potential disaster? Check this featured resource to find out if your IT team is focusing on the 10 priorities of systems management, and why these could make or break your infrastructure.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

SolarWinds, Inc.

Financial Services Firm Supports Compliance with Archiving
sponsored by Hewlett-Packard Company
CASE STUDY: Learn why a leading financial institution deployed HP Digital Safe and other HP tools to help manage terabytes of data.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Hewlett-Packard Company

Sensitive Data Is Everywhere, So Data Protection Should Be, Too
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic helps you to think about where your data and keys are located and who has access to them, and also presents one company's data protection portfolio, which provides persistent protection of sensitive information at all critical points in its lifecycle.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Risk Assessment Redo: Trends that make you rethink info governance strategy
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: New data protection vulnerabilities have forced organizations to reexamine risk management strategy. In this classroom, learn how to adapt your risk assessment and information management strategies to face modern threats.
Posted: 08 Dec 2014 | Premiered: 05 Dec 2014

SearchCompliance.com

How Beckman Coulter Achieved Global Trade Compliance, Optimized Performance, and Cut Costs
sponsored by Oracle Corporation UK Ltd
VIDEO: In this short video, medical device company Beckman Coulter's senior IT manager describes how Oracle Global Trade Management enabled the organization to meet global trade compliance regulations while realizing performance gains and cost savings.
Posted: 03 Dec 2014 | Premiered: 24 Feb 2014

Oracle Corporation UK Ltd

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Mobility Tech Dossier: There's an App for That, But Is It Secure?
sponsored by Hewlett-Packard Company
WHITE PAPER: Security has eroded over the past decade as companies strive to create applications for multiple platforms by farming design and development out to subcontractors, straining the processes and governance put in place to ensure application security. Read this dossier for proven best practices to mitigate risk and embrace mobility without trepidation.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Five Must-Haves for Enterprise File Sync and Share Flexibility
sponsored by Code42
WHITE PAPER: This is why it's vital to have an enterprise-grade sync and share solution in place, but what constitutes enterprise grade? Read this whitepaper for five must-haves for enterprise sync and share flexibility.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

IT Governance and Compliance Strategies for the CIO
sponsored by Box
EGUIDE: This expert e-guide offers advice for how CIO's can ensure their IT governance and compliance strategies are successful, and discover what technologies are available to mitigate compliance problems.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Box

IT Compliance FAQ Guide
sponsored by Box
EGUIDE: In this expert e-guide, examine some frequently asked questions with respect to GRC and IT compliance including important frameworks, who is affected and more.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Box

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Governance Structures for the BYO Era
sponsored by SearchCIO
EBOOK: Bring your own anything is suffusing the enterprise, and CIOs are pursuing new governance structures to tame the mobile chaos.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

SearchCIO

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell
WHITE PAPER: This whitepaper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell

How Access Governance Makes Data Loss Prevention Successful
sponsored by RSA
WHITE PAPER: Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

RSA

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett-Packard Company
1 - 25 of 203 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement