Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance,  … 
Definition continues below.
Regulatory ComplianceReports
76 - 100 of 756 Matches Previous Page  | Next Page
An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Global profiles of the fraudster
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Reducing the costs and risks of data storage in the federal government
sponsored by IBM
WHITE PAPER: This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
Posted: 29 Oct 2013 | Published: 30 Jun 2012

IBM

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

October 2013 Health IT E-Zine
sponsored by SearchHealthIT.com
EZINE: In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

SearchHealthIT.com

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

The Need for Data Loss Prevention Now
sponsored by Clearswift
WHITE PAPER: This resource takes a deep look at why data leakage prevention (DLP) is so vital to data protection, explains the multiple ways data can leak out of your enterprise, and outlines a five-step approach to reaching DLP nirvana.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

Clearswift

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution
sponsored by RSA
PRODUCT LITERATURE: SEA is a comprehensive email archiving solution from Sunbelt Software that effectively addresses today's corporate email communication needs.
Posted: 17 Feb 2014 | Published: 29 Aug 2008

RSA

Demand More From Your Data Center Environment
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a colocation strategy that offers more than just space and power to help you optimize your data center operations, achieve compliant IT security, and more.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Welcome to Iron Mountain’s National Data Center
sponsored by Iron Mountain
WEBCAST: This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.
Posted: 27 Jan 2014 | Premiered: Jan 27, 2014

Iron Mountain

New Data Center Designs Go Underground for Energy Efficiency
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a service that's changing the data center colocation model by delivering the key capabilities and functions you need to align your data center infrastructure with disaster recovery requirements and fuel success.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Data Center Designs to Help Meet Your Compliance Challenge
sponsored by Iron Mountain
WHITE PAPER: This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
sponsored by BlackBerry
WEBCAST: This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

BlackBerry

Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act
sponsored by Absolute Software
CASE STUDY: This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.
Posted: 13 Nov 2013 | Published: 31 Dec 2012

Absolute Software

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute Software

Flash: Maximo Asset Management for Healthcare Organizations
sponsored by IBM
VIDEO: This brief video describes an asset management tool that can help you meet the challenges of an evolving healthcare landscape. Tune in to learn how you can increase productivity and asset utilization, manage compliance, lower costs, and more.
Posted: 05 Nov 2013 | Premiered: 05 Nov 2013

IBM

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware
76 - 100 of 756 Matches Previous Page    2 3 4 5 6 7    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance, risk and compliance at SearchCompliance.com
Regulatory Compliance definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement