Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Sarbanes Oxley Law

RSS Feed    Add to Google    Add to My Yahoo!
Sarbanes Oxley Law Reports
 
Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.

Privileged User Monitoring for SOX Compliance
sponsored by Tizor
WHITE PAPER: This paper outlines a best-practices approach to monitoring and reporting segregation of duties, privileged user access activity, failed logins and other access failures, direct Data SQL Access events and database schema changes.
Posted: 21 Aug 2006 | Published: 01 Aug 2006

Tizor

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
sponsored by SearchCompliance.com
EBOOK: Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

SearchCompliance.com

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Sarbanes-Oxley IT Compliance: How to Leverage Automated Control Objective Auditing
sponsored by nCircle
WHITE PAPER: Read this white paper to learn how nCircle Suite360, the world's most comprehensive security and compliance audit suite, provides a unified solution for compliance automation and consistency for Sarbanes-Oxley as well as other enterprise regulations.
Posted: 16 Mar 2009 | Published: 02 Mar 2009

nCircle

Co-Marketing with Channel Partners: Expand Your Marketing Reach with Channel Marketing Funds
sponsored by SAP AG
WHITE PAPER: As organizations seek new ways to increase brand awareness and generate demand in more complex market environments, there has been a renewed interest in co-marketing programs. This paper provides techniques to achieve this.
Posted: 19 Sep 2008 | Published: 17 Sep 2008

SAP AG

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement