Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

SOX

RSS Feed    Add to Google    Add to My Yahoo!
SOXReports
 
E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

Fixed Asset Inventory: A Guide to Getting Started
sponsored by Sage Software
WHITE PAPER: Deployment of a fixed asset management provides countless benefits ranging from prevention of overpayment on property tax and insurance, to  reducing the risk of non-compliance with Sarbanes-Oxley Act. Read this paper to learn about best practices for fixed asset inventory management and tips for implementing a successful inventory process.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Sage Software

The Role of Password Management in Achieving Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will look at the dramatic impact password management solutions have had on organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation

Log Management Best Practices
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA, The Security Division of EMC

Building a Best-Run Finance Organization
sponsored by SAP America, Inc.
WHITE PAPER: This SAP Executive Insight examines the changing role of the finance organization in today's business environment. Further, it describes how companies can develop best-run finance organizations.
Posted: 08 Jun 2009 | Published: 01 Jun 2008

SAP America, Inc.

Revamping and optimizing your SAP GRC strategy
sponsored by Security Weaver
EBOOK: GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Co-Marketing with Channel Partners: Expand Your Marketing Reach with Channel Marketing Funds
sponsored by SAP AG
WHITE PAPER: As organizations seek new ways to increase brand awareness and generate demand in more complex market environments, there has been a renewed interest in co-marketing programs. This paper provides techniques to achieve this.
Posted: 19 Sep 2008 | Published: 17 Sep 2008

SAP AG

Regulations Shift Focus on Outbound Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them.
Posted: 10 Jul 2008 | Published: 10 Jul 2008

Proofpoint, Inc.

The IT/Compliance Challenge within Segregation of Duties: Eliminating Developer Access to the Production Environment
sponsored by BMC Software, Extending Value with Identify Software
WHITE PAPER: This white paper reviews effective methods for creating controlled, secure access to complete problem data for your developers so they can solve production problems without actually accessing your production environment.
Posted: 16 Nov 2006 | Published: 01 Nov 2006

BMC Software, Extending Value with Identify Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
SOX White Papers | SOX Multimedia | SOX IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement