Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards. These standards are commonly defined by large, independent entities such as the Institute of Electrical and Electronics Engineers (IEEE), the World Wide Web Consortium (W3C) or the European Telecommunications Standards  … 
Definition continues below.
Regulatory Compliance Reports
226 - 250 of 663 Matches Previous Page  |  Next Page
E-Book: Technical Guide on Web Application Firewalls
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

SearchSecurity.com

ArcSight Logger: Universal Log Management Solution
sponsored by ArcSight, an HP Company
PRODUCT OVERVIEW: ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

ArcSight, an HP Company

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE: This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Silver Tail Systems

How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g
sponsored by Miro Consulting, Inc.
PRESENTATION TRANSCRIPT: Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII).
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Miro Consulting, Inc.

EMC VNXe Series Software Packs: Simple Data Protection and More
sponsored by EMC Computer Systems (UK) Ltd.
PRODUCT OVERVIEW: EMC has packaged unique and powerful add-on storage software into two attractively priced, easy-to-order software packs: Total Value Pack and Total Protection Pack available for the VNXe 3100 and VNXe 3300 respectively, ensuring maximum protection, security, and compliance.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

EMC Computer Systems (UK) Ltd.

Is Your Acceptable Use Policy Social Media-proof?
sponsored by M86 Security
WHITE PAPER: This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

M86 Security

A More Secure Front Door: SSO and Strong Authentication
sponsored by Imprivata
WHITE PAPER: Times change. Sometimes they change even faster than we might expect, as recent developments in Strong Authentication have shown. Just a few years ago, the idea of requiring users to provide a second form of identity to gain access to IT resources was seen by many as only necessary for remote access security or top-secret jobs.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Imprivata

Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.
Posted: 08 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

Top Ten Database Security Threats
sponsored by Imperva
WHITE PAPER: The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Five Signs Your File Data is at Risk
sponsored by Imperva
WHITE PAPER: Persistent insider threats and regulatory compliance mandates make protecting sensitive file data a business requirement for virtually every organization. However, the sheer volume of file data and its rapid and continuous growth make it a challenge to secure properly.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

GeoTrust, Inc.

EIU Report: Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry
sponsored by Oracle Corporation
WHITE PAPER: This research report explains how to ensure long-term viability in the financial services industry by depending on your ability to invest wisely in projects, meet regulatory targets and avoid the costly and public failures that brought down so many other organizations in the financial services industry.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Oracle Corporation

Migrating to Windows 7: How to Select a Provider for PC Online Backup and Recovery
sponsored by Iron Mountain
WHITE PAPER: In addition to implementing strategic initiatives, IT has the basic function of keeping workers productive. With many enterprises migrating to Microsoft Windows 7, it is important to consider a backup provider that supports Microsoft’s latest platform. Read this white paper to learn more.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Iron Mountain

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER: Access this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.
Posted: 11 Jan 2011 | Published: 11 Jan 2011

Qualys

Records Management’s Breaking Point: Managing Electronic Records in High Volume Environments
sponsored by ASG Software Solutions
WHITE PAPER: This white paper outlines some of the issues that make electronic records management so challenging, highlights why organizations need to tame the high-volume transactional records beast, and lastly, describes what to look for in a transactional records management solution.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

ASG Software Solutions

The Information Agenda: Rapidly Leveraging Information as a Trusted Strategic Asset for Competitive Advantage
sponsored by IBM
WHITE PAPER: As the CIO of a flourishing business, you are happy to report that the current information projects are going well. The new call center is up and running, the new data warehouse is on-line, and the new customer loyalty systems have been deployed successfully.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

IBM

Test and simulate rules using WebSphere ILOG Business Rules Management System
sponsored by IBM
PRODUCT DEMO: Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Posted: 12 Dec 2010 | Premiered: 12 Dec 2010

IBM

RSA Security Information and Event Management (SIEM) Deployment Guide
sponsored by RSA
WHITE PAPER: The Cisco Smart Business Architecture for Enterprise offers partners and customers valuable network design and deployment best practices; helping organizations deliver superior end-user experiences that include switching, routing, security, and wireless technologies combined with the comprehensive management capabilities for the entire system.
Posted: 10 Dec 2010 | Published: 10 Dec 2010

RSA

Examining Control System Security and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper will provide an overview of cyber threats and regulations within critical infrastructure specific to control system environments. The paper will then present a general overview of control system architecture and identify common vulnerabilities within these environments.
Posted: 30 Nov 2010 | Published: 30 Nov 2010

ArcSight, an HP Company

Case Study: Northern Trust Turns To Google For More Accurate and Relevant Search
sponsored by Google Search Appliance
CASE STUDY: In order to ensure regulatory compliance, Northern Trust's IT department needed a better tool to help employees quickly find the latest forms and information. Using the Google Search Appliance, OneBox and User-Added Results, Northern Trust increased both the accuracy and relevance of all intranet searches. Read this case study.
Posted: 29 Nov 2010 | Published: 29 Nov 2010

Google Search Appliance

Presentation Transcript: Why You Need To Create An ESI Strategy
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Electronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Iron Mountain

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE: November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

Information Security Magazine

Windows 7 and Desktop Lockdown with Privilege Management
sponsored by Viewfinity
WHITE PAPER: With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown.  Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments.
Posted: 04 Nov 2010 | Published: 03 Nov 2010

Viewfinity

Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
sponsored by Google
EZINE: Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google
226 - 250 of 663 Matches Previous Page    8 9 10 11 12 13    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards. These standards are commonly defined by large, independent entities such as the Institute of Electrical and Electronics Engineers (IEEE), the World Wide Web Consortium (W3C) or the European Telecommunications Standards Institute (ETSI).Conformance testing can be carried out by private companies that specialize in that service. In some instances the vendor maintains an in-house department for conducting conformance tests prior to the initial release of a product or upgrade. In the software industry, once the set of tests has been completed and a program has been found to comply with all the applicable standards, that program can be advertised as having been certified by the organization that defined the standards and the corporation or organization that conducted the tests.
Regulatory Compliance definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement