IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 254 Matches Previous Page  |  Next Page
Hybrid Strategies Common as Organizations Strive for Cloud GRC
sponsored by IBM
EGUIDE: This expert e-guide presents best practices for ensuring cloud GRC.
Posted: 21 May 2015 | Published: 06 May 2015

IBM

Rethinking Cloud Content Collaboration in Financial Services
sponsored by Box
WHITE PAPER: Access this white paper to see how cloud-based content collaboration can meet customer demands in financial services while increasing productivity, and allowing the business to get around capacity and speed-to-market issues.
Posted: 20 May 2015 | Published: 20 May 2015

Box

Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Enterprise-grade management for Amazon Web Services (AWS)
sponsored by Red Hat
WHITE PAPER: This technical detail describes how Red Hat® CloudForms offers you a unified management framework with advanced life cycle management capabilities across infrastructure platforms, such as OpenStack®, VMware, Red Hat, and Amazon.
Posted: 14 May 2015 | Published: 31 Dec 2013

Red Hat

Magic Quadrant for Operational Risk Management
sponsored by RSA
EGUIDE: Inside this helpful guide, discover the strengths and cautions of today's top ORM vendors and platforms. Continue reading to learn what to look for in a platform as well as what to avoid when making your selection.
Posted: 13 May 2015 | Published: 15 Dec 2014

RSA

Case Study: Coca-Cola Reduces its Migration Timeline by 33%
sponsored by Dell Software
WHITE PAPER: This brief white paper pinpoints savvy strategies for email migration, using CCBCC as an example. Discover ways to transition with ease of installation, technical support and cost-cutting migration technology.
Posted: 13 May 2015 | Published: 28 Sep 2012

Dell Software

Email Migration: Don't be a Burden, be On-Budget
sponsored by Dell Software
WHITE PAPER: This white paper emphasizes ways to mitigate the risks of email transitioning. Discover how to reduce the burden on the migration team and help desk while reaping six key benefits
Posted: 13 May 2015 | Published: 31 Dec 2014

Dell Software

Reviews and Ratings for 11 Risk Management Products
sponsored by RSA
WHITE PAPER: In this Gartner report, you'll find reviews and ratings of eleven different products that promise make risk management and compliance easier.
Posted: 12 May 2015 | Published: 10 Mar 2015

RSA

Aligning Audit Objectives And Organizations Processes
sponsored by RSA
WHITE PAPER: This infographic lays out a 10 step plan for aligning audit objectives with strategic and operating objectives.  View now to learn more.
Posted: 11 May 2015 | Published: 17 Dec 2014

RSA

Harness Operational Risk with Enterprise GRC
sponsored by RSA
WHITE PAPER: This white paper examines the four key requirements to building an effective operation risk management program. View now to learn how to understand risk across the enterprise and analyze risk across silos. Read on to learn more.
Posted: 11 May 2015 | Published: 31 Dec 2014

RSA

Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST: This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014

Absolute Software

Intelligence-driven GRC for Security
sponsored by RSA
WHITE PAPER: Discover how a comprehensive, intelligence-driven GRC model extends visibility into data and processes, provides in-depth analysis of risks and compliance issues, and allows businesses to anticipate, respond and continuously adapt in a rapidly changing landscape.
Posted: 06 May 2015 | Published: 06 May 2015

RSA

Information Governance in Federal Agencies
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, discover a 4 step plan for designing, managing, and retaining an information governance program to firm up security and gain granular control over data.
Posted: 06 May 2015 | Published: 24 Feb 2014

Hewlett-Packard Company

The Evolution of Provisioning
sponsored by RSA
WHITE PAPER: This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.
Posted: 05 May 2015 | Published: 04 Dec 2014

RSA

Overcome Compliance Obstacles for Better Decision-Making
sponsored by SAS
WHITE PAPER: Learn how to keep your enterprise data in compliance while receiving support in; managing data for decision making, monitoring model risk and performance, implementing models with cost-effective automation and providing reconciliation between risk and finance.
Posted: 04 May 2015 | Published: 05 May 2015

SAS

Azure Active Directory Solutions for Identity and Access Management
sponsored by Microsoft
WHITE PAPER: In this white paper, discover several common scenarios and understand how Azure™ Active Directory® (Azure AD) provides a comprehensive solution that addresses identity and access management requirements for on-premises and cloud applications, including Office 365 and a world of non-Microsoft SaaS applications.
Posted: 30 Apr 2015 | Published: 01 Feb 2014

Microsoft

Everything You Need To Know About Private Clouds
sponsored by Accelerite
EBOOK: This ebook highlights 6 major areas you need to focus on to successfully create a private cloud for your company.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Accelerite

The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines IT's complex dichotomy of document protection versus access in the mobile age, while issuing the consequences of inadequate security. Read on to ensure that your organization is avoiding the business issues that impact the information security management of corporate documents and content.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

IntraLinks, Inc

Managing Enterprise-Wide Model Lifecycle Risk
sponsored by SAS
CASE STUDY: View this white paper to learn how to centralize model risk management and how to achieve a single-pane-of-glass view across the enterprise.
Posted: 24 Apr 2015 | Published: 28 Jan 2015

SAS

PCIDSS Compliance and Privileged Access Monitoring
sponsored by BalaBit
WHITE PAPER: This white paper explores how to control and audit data access on servers, networking devices, and virtualized applications and ensure PCI compliance.
Posted: 21 Apr 2015 | Published: 24 Feb 2014

BalaBit

When Retention Schedules Shouldn't Live Up to their Name
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you understand how retention schedules have unintentionally misled companies into keeping unneeded data. Learn why taking the leap to get rid of excess information is a solid way to govern it, lessen risk, and save money.
Posted: 19 Apr 2015 | Published: 20 Apr 2015

Iron Mountain

Information Maps: A Records Management Must
sponsored by Iron Mountain
WHITE PAPER: Whether you're in IT, records and information management, data security and privacy, data analytics, or other specific business units, read on to learn why visibility into where your information resides will enable various benefits.
Posted: 19 Apr 2015 | Published: 19 Apr 2015

Iron Mountain

Mobility in Government Services
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn how to get the most out of your EMM compliance strategy. View now to explore a helpful checklist.
Posted: 15 Apr 2015 | Published: 17 Dec 2014

BlackBerry

How to comply with the HIPAA Security Rule
sponsored by GeoTrust, Inc.
EGUIDE: This white paper teaches you how to stay up to date with HIPAA and HITECH regulations to protect PHI. Additionally, read on now to learn the three keys to effective partner management for compliance.
Posted: 15 Apr 2015 | Published: 04 Dec 2014

GeoTrust, Inc.

Mobile Management Compliance Checklist in Financial Services
sponsored by BlackBerry
WHITE PAPER: This white paper provides you with the essential questions to ask when evaluating an EMM solution and how to ensure compliance.
Posted: 14 Apr 2015 | Published: 04 Dec 2014

BlackBerry
1 - 25 of 254 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement