Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

SOX Compliance

RSS Feed    Add to Google    Add to My Yahoo!
SOX Compliance Reports
Thomas & King Case Study: The Right Ingredients for Software Asset Management
sponsored by Dell, Inc. and Intel®
CASE STUDY: Read this Dell case study to learn how a restaurant franchisee gets its IT cooking with the right reporting from Dell Software Inventory & Usage Management.
Posted: 07 Oct 2009 | Published: 01 Oct 2008

Dell, Inc. and Intel®

Twenty-three reasons why companies choose integrated XBRL
sponsored by IBM
WHITE PAPER: This paper discusses how companies around the world must determine how they will approach compliance with the mandated use of XBRL. Learn the proper approach to accelerate financial reporting, decrease errors, streamline processes and ultimately, lower costs.
Posted: 27 May 2011 | Published: 27 May 2011


FAQ Guide: Regulatory Compliance Issues Drive Some IT Shops to Data Archive Appliances
sponsored by IBM
EGUIDE: Check out this FAQ guide to learn about the latest developments and the evolution of data archiving technology, the key characteristics of different appliances and more.
Posted: 13 Sep 2011 | Published: 13 Sep 2011


Achieving ISO 27001 Compliance using Titus Solutions
sponsored by TITUS
WHITE PAPER: This paper provides IT professionals with a high level overview of ISO 27001 and 27002, along with their implications for security of email and digital documents.
Posted: 11 Nov 2010 | Published: 11 Nov 2010


McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010


The Business Case for a Next-Generation SIEM: Delivering Operational Efficiency and Lower Costs Through An Integrated Approach to Network Security Management
sponsored by Q1 Labs, an IBM Company
WHITE PAPER: The selection of the most effective IT technology is a major concern for companies of all sizes, across almost every industry. Read this white paper to learn more about how Q1 Labs' next-generation security information and event management solutions can help protect your IT assets at a lower cost to the company.
Posted: 08 Oct 2010 | Published: 07 Oct 2010

Q1 Labs, an IBM Company

A Decision Maker’s Guide to GRC Solutions
sponsored by Intel Security
EZINE: It’s been almost a decade since the Sarbanes-Oxley Act changed the governance, risk and compliance (GRC) landscape, but companies continue to grapple with putting together clean solutions that address their needs. Access this resource for a comprehensive checklist of features to look for when selecting a GRC vendor.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Intel Security

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement