Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance,  … 
Definition continues below.
Regulatory ComplianceReports
76 - 100 of 694 Matches Previous Page  | Next Page
Securing Your IT Infrastructure with SOC/NOC Collaboration
sponsored by Hewlett-Packard Company
WHITE PAPER: Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Posted: 22 Apr 2013 | Published: 28 Sep 2012

Hewlett-Packard Company

What to Look for When Selecting a Master Data Management Solution
sponsored by Talend
WHITE PAPER: In this guide, discover what you should look for when selecting a master data management (MDM) platform and learn how the right choice can help drive strategic business initiatives such as the cloud and big data. Continue reading to learn more.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Talend

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com

Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

IDC white paper: Better Identity and Access Management in the Age of Cloud Computing
sponsored by Ping Identity Corporation
WHITE PAPER: In this Q&A session, get the answers to your top identity and access management questions to learn how to achieve better IAM in the age of cloud computing.
Posted: 27 Feb 2013 | Published: 31 Aug 2012

Ping Identity Corporation

Controlling and Managing Superuser Access
sponsored by Dell Software
WHITE PAPER: "Super users" – those people with greater access and rights – is a necessary part of IT. However, privileged accounts carry implicit security risks, so securing them – while preserving access and ease of use – is vital. Discover the risks associated with privileged accounts and how to mitigate them. Read "Controlling and Managing Super User Access"
Posted: 19 Dec 2012 | Published: 31 Dec 2011

Dell Software

PCI Council issues mobile application rules for software developers
sponsored by Hewlett-Packard Company
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Hewlett-Packard Company

PhoneFactor Case Study: Fredrikson & Byron, P.A.
sponsored by PhoneFactor
CASE STUDY: Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

PhoneFactor

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods
sponsored by Attachmate Corporation
WHITE PAPER: This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach.
Posted: 10 Apr 2013 | Published: 31 Dec 2012

Attachmate Corporation

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit
sponsored by Attachmate Corporation
CASE STUDY: This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!
Posted: 09 Apr 2013 | Published: 30 Mar 2012

Attachmate Corporation

The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate
sponsored by Attachmate Corporation
WHITE PAPER: Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution.
Posted: 09 Apr 2013 | Published: 29 May 2009

Attachmate Corporation

Controlling the Cost of File Transfers
sponsored by Attachmate Corporation
WHITE PAPER: View this resource to learn about a family of managed solutions that can help you meet the file transfer needs of your enterprise without the costly, resource-hungry investment of a homegrown solution.
Posted: 09 Apr 2013 | Published: 31 Dec 2010

Attachmate Corporation

Financial process automation leads to better performance
sponsored by Dolphin
EGUIDE: Financial reporting can be time-consuming and expensive if done manually. In this expert guide, learn how automating financial reporting can offer your organization key benefits and discover recommendations on how to get started.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

Dolphin

File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement
sponsored by Attachmate Corporation
WHITE PAPER: Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more!
Posted: 05 Apr 2013 | Published: 31 Aug 2010

Attachmate Corporation

SAP data archiving: The keys to a successful project revealed
sponsored by Dolphin
EBOOK: In this expert E-Book, find practical advice for developing an SAP data archiving strategy, and learn how this approach can help you better manage data volumes while meeting compliance and e-discovery requirements.
Posted: 05 Apr 2013 | Published: 31 Dec 2011

Dolphin

Recognizing the Value of Data Management in the Financial Sector
sponsored by Bloomberg
EGUIDE: The combination of poor reference data management and the Dodd-Frank Wall Street Reform and Consumer Protection Act is creating a data management mess for many in the financial sector. Access this expert resource to explore how organizations can start preparing to meet new compliance regulations and increase data transparency.
Posted: 21 Feb 2013 | Published: 21 Feb 2013

Bloomberg

Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE: This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
sponsored by IBM and SI Architects
EGUIDE: In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Web Application Firewalls: Patching, SDLC Key for Security, Compliance
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Symantec Corporation

Best Practices for Cloud Security
sponsored by Qualys
WHITE PAPER: In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more.
Posted: 22 Jan 2013 | Published: 31 Jan 2012

Qualys

McAfee ePO Deep Command and Intel vPro Technology
sponsored by Intel
WEBCAST: In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now.
Posted: 02 Jan 2013 | Premiered: Jan 2, 2013

Intel

How to Manage Secure File Transfers to Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE: This expert eGuide will help you learn how to maintain a balance between functionality and security when it comes to wide area network (WAN) file transfers. IT expert Dan Sullivan answers questions about WAN management and how to ensure secure transfers.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

IBM and SI Architects

Sustainability: From Strategic Objective to Compliance Operation
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

HP & Intel®

E-Discovery Cloud Considerations
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Symantec Corporation
76 - 100 of 694 Matches Previous Page    2 3 4 5 6 7    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance, risk and compliance at SearchCompliance.com
Regulatory Compliance definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement