Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Public Company Accounting Reform and Investor Protection Act

RSS Feed    Add to Google    Add to My Yahoo!
Public Company Accounting Reform and Investor Protection Act Reports
 
Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation

Unauthorized Applications: Taking Back Control
sponsored by Sophos
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos

Presentation Transcript: Enabling Total Spend Analysis in the Enterprise
sponsored by TIBCO Spotfire Division
PRESENTATION TRANSCRIPT: In this transcript of the webcast, TIBCO Spotfire's John Callan will discuss how you can perform Total Spend Analysis to help drive supplier consolidation, contract compliance and identify maverick spend in a user-friendly, visual analysis environment.
Posted: 04 Dec 2009 | Published: 04 Dec 2009

TIBCO Spotfire Division

Turning the Compliance Challenge into a Business Advantage
sponsored by SAP America, Inc.
WHITE PAPER: New rules have spawned an army of consultants, vendors and solutions to address the "compliance" problem. Read this paper to learn how to turn the compliance challenge into a business advantage.
Posted: 26 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos

Case Study: Fortune 100 Insurance Company and Security Weaver
sponsored by Security Weaver
CASE STUDY: For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Monitoring Physical Threats in the Data Center
sponsored by Schneider Electric
WHITE PAPER: This paper describes the class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime.
Posted: 04 Feb 2009 | Published: 03 Feb 2009

Schneider Electric

The IT Manager's Working Guide to Sustainable SOX Compliance
sponsored by SoftLanding Systems, Inc.
WHITE PAPER: Learn how to overcome real-world compliance challenges and optimize your SOX efforts. Packed with NEW resources, tips, and a SOX-specific list of COBIT 4.0 objectives, this paper offers actionable tactics to help IT departments achi...
Posted: 02 Oct 2006 | Published: 01 Aug 2006

SoftLanding Systems, Inc.

Building a Best-Run Finance Organization
sponsored by SAP America, Inc.
WHITE PAPER: This SAP Executive Insight examines the changing role of the finance organization in today's business environment. Further, it describes how companies can develop best-run finance organizations.
Posted: 08 Jun 2009 | Published: 01 Jun 2008

SAP America, Inc.

Security Controls Oversight for Sarbanes-Oxley Audit and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: Download this white paper and learn how ensure your company's compliant with a security management strategy that enables you centrally collect, store, monitor and display security event data.
Posted: 24 Jan 2007 | Published: 01 Dec 2006

ArcSight, an HP Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement