Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance,  … 
Definition continues below.
Regulatory ComplianceReports
1 - 25 of 756 Matches Previous Page  | Next Page
Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

Compliance for Cloud Environments Simplified
sponsored by CloudPassage
WHITE PAPER: This white paper introduces Halo, which automates security controls for compliance without compromising cloud efficiency.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Report Helps Healthcare IT Execs Navigate the Cloud
sponsored by Insight
WHITE PAPER: This white paper summarizes a recent report from the Institute for Health Technology Transformation that addressed the state of cloud computing within the healthcare industry.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Insight

Scale-Out Data Lake Built on EMC Isilon - Simple, Scalable, Efficient, and Secure
sponsored by EMC Isilon
WHITE PAPER: This white paper explains why enterprise data growth is best addressed by a data lake, which consolidates storage into one single, central repository of persistent data, and describes the advantages of building a data lake based on EMC Isilon.
Posted: 24 Nov 2014 | Published: 30 Sep 2014

EMC Isilon

Presentation Transcript: Forrester on Cloud Adoption: Hosting Senistive Data in the Cloud
sponsored by Dell, Inc.
WHITE PAPER: This transcript examines how the top providers in the coming years will be transparent in sharing their security, client's policies and procedures. For instance, a provider needs to be willing to sign a BAA that is a Business Associate Agreement if operating in the healthcare sector.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Dell, Inc.

Podcast: Forrester on Cloud Adoption: Hosting Senistive Data in the Cloud
sponsored by Dell, Inc.
PODCAST: This podcast examines how the top providers in the coming years will be transparent in sharing their security, client's policies and procedures. For instance, a provider needs to be willing to sign a BAA that is a Business Associate Agreement if operating in the healthcare sector.
Posted: 21 Nov 2014 | Premiered: Nov 21, 2014

Dell, Inc.

Healthcare Solutions Brief: Healthy Data's at the Heart of Modern Healthcare
sponsored by Nexenta
WHITE PAPER: This whitepaper explains how Nexenta is helping healthcare organizations eliminate data management bottlenecks and deliver cost-effective solutions that are highly scalable for a broad range of end-user needs.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Nexenta

A Powerful Foundation for Virtual Environments and Cloud Computing Infrastructure
sponsored by Intel Corporation
WHITE PAPER: Access this white paper to learn how you can virtualize any workload and create a more flexible and secure data center and deliver advanced cloud computing functionality. Read on to find out how this approach allows you to strengthen security and compliance, reduce IT costs, and more.
Posted: 20 Nov 2014 | Published: 28 Feb 2013

Intel Corporation

Cloud Security Solutions You Can Trust
sponsored by Intel Corporation
WHITE PAPER: This white paper explains how cloud security solutions from Intel and VMware can enable your organization to confidently deploy a cloud infrastructure by safeguarding your sensitive data and strengthening regulatory compliance.
Posted: 20 Nov 2014 | Published: 30 Apr 2013

Intel Corporation

Overcoming the Top 7 Challenges of Backup Compliance
sponsored by APTARE
WHITE PAPER: This white paper outlines 7 top compliance challenges that companies face in implementing SOX guidelines.
Posted: 17 Nov 2014 | Published: 28 Jun 2013

APTARE

IDC: The Impact of Citrix ShareFile Cloud for Healthcare on Mission Benefits
sponsored by Citrix
WHITE PAPER: This buyer case study examines how one organization was able to avoid the complications and on-going maintenance required with an on-premise file server approach by opting to adopt a cloud file sharing solution. Read on to learn how they were able to streamline their core business operations while still ensuring compliance.
Posted: 17 Nov 2014 | Published: 31 Dec 2013

Citrix

When Worlds Collide: Cloud Apps and Financial Services
sponsored by BitGlass
WHITE PAPER: Read this white paper to learn how to tackle the two major hurdles that businesses must clear when moving financial data to public cloud applications: Security and compliance regulations.
Posted: 14 Nov 2014 | Published: 14 Nov 2014


Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

How Tenable Optimized Vulnerability Management for Crosskey Banking Solutions
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how Crosskey Banking Solutions worked with Tenable Network Security to reduce risk and ensure PCI DSS compliance.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Tenable Network Security

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

Vulnerability Management and Risk Assessment for the Cybersecurity Framework
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes one company's scalable, targeted approach to helping organizations meet the vulnerability and compliance requirements set by the NIST's Cybersecurity Framework.
Posted: 11 Nov 2014 | Published: 24 Feb 2014

Tenable Network Security

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Trends in Data Centric Security
sponsored by Intel® Services
WHITE PAPER: This white paper discusses Data Centric Security, which protects data when it is shared across multiple platforms, systems, or data centers by focusing security controls onto the data itself, rather than relying on the underlying infrastructure to keep it out of the wrong hands.
Posted: 05 Nov 2014 | Published: 14 Sep 2014

Intel® Services

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel® Services
WHITE PAPER: This white paper discusses how you can generate tokens that replace credit card numbers with surrogates, removing systems from PCI DSS "Scope"―which include any network components that are the primary focus of PCI DSS regulation, compliance, and assessment.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

PCI DSS Tokenization Buyer’s Guide
sponsored by Intel® Services
WHITE PAPER: The guide describes how tokenization works, and how retailers and other businesses can deploy it to reduce risks of data compromise and the cost of PCI compliance.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

Intel® Mashery™ API Gateway - Tokenization
sponsored by Intel® Services
WHITE PAPER: Intel® Mashery™ API Gateway - Tokenization is a hardware or software appliance that dramatically simplifies PCI DSS & PII compliance and administration for organizations across all industry types that accept, capture, store, transmit or process credit card, debit card, or sensitive personal data.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Intel® Services

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic
1 - 25 of 756 Matches Previous Page    1 2 3 4    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance, risk and compliance at SearchCompliance.com
Regulatory Compliance definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement