Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Sarbanes Oxley Act

RSS Feed    Add to Google    Add to My Yahoo!
Sarbanes Oxley Act Reports
 
Understanding Data Protection Regulations in the US
sponsored by Varonis
WHITE PAPER: This white paper outlines several important security regulations in the United States and gives advice on successfully meeting all of them.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Regulations Shift Focus on Outbound Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them.
Posted: 10 Jul 2008 | Published: 10 Jul 2008

Proofpoint, Inc.

Fixed Asset Inventory: A Guide to Getting Started
sponsored by Sage Software
WHITE PAPER: Deployment of a fixed asset management provides countless benefits ranging from prevention of overpayment on property tax and insurance, to  reducing the risk of non-compliance with Sarbanes-Oxley Act. Read this paper to learn about best practices for fixed asset inventory management and tips for implementing a successful inventory process.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Sage Software

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor

Lessons Learned for SOX Compliance and Other Regulatory Challenges
sponsored by Symantec Corporation
WHITE PAPER: This paper examines lessons learned for Sarbanes Oxley Compliance and shows your company how to restructure the risk management function, internal controls, and IT security that help to comply with regulatory requirements.
Posted: 17 May 2007 | Published: 01 May 2007

Symantec Corporation

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Best Practices for Database Security and Compliance
sponsored by Guardium, an IBM Company
WEBCAST: Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)

Guardium, an IBM Company

CWAT Data Loss Prevention - Whitepaper/Technical Review
sponsored by Software Engineering of America, Inc.
WHITE PAPER: CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks.
Posted: 25 Feb 2008 | Published: 01 Sep 2006

Software Engineering of America, Inc.

The IT/Compliance Challenge within Segregation of Duties: Eliminating Developer Access to the Production Environment
sponsored by BMC Software, Extending Value with Identify Software
WHITE PAPER: This white paper reviews effective methods for creating controlled, secure access to complete problem data for your developers so they can solve production problems without actually accessing your production environment.
Posted: 16 Nov 2006 | Published: 01 Nov 2006

BMC Software, Extending Value with Identify Software

Monitoring Physical Threats in the Data Center
sponsored by Schneider Electric
WHITE PAPER: This paper describes the class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime.
Posted: 04 Feb 2009 | Published: 03 Feb 2009

Schneider Electric
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement