Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Section 404

RSS Feed    Add to Google    Add to My Yahoo!
Section 404 Reports
 
PowerBroker Password Safe: Security, Compliance, Productivity
sponsored by BeyondTrust Corporation
TRIAL SOFTWARE: Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
Posted: 29 Apr 2013 | Premiered: 29 Apr 2013

BeyondTrust Corporation

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

The Information Governance Imperative
sponsored by RSD
WHITE PAPER: Read this paper to learn how information governance is becoming more important in today's business world and learn why your organization needs to implement an information governance strategy today and how to go about implementing one.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

RSD

Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
sponsored by Symantec Corporation
WEBCAST: View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

An On-Demand Sourcing Solution for Rapid and Sustainable Savings
sponsored by SAP America, Inc.
WHITE PAPER: Many procurement organizations struggle to meet savings goals with an overworked staff using time-consuming, manual processes or outdated systems. Read this paper to learn how to better collaborate with key stakeholders, qualify suppliers, ensure a competitive bidding process, and negotiate contract terms with suppliers.
Posted: 22 Apr 2012 | Published: 31 May 2011

SAP America, Inc.

Monitoring for SAP: High-Risk Financial Transactions in Real Time
sponsored by Security Weaver
WHITE PAPER: For corporations using SAP, identifying and controlling risky financial transactions is a major undertaking. This paper examines the monitoring challenges faced by finance and reveals the many advantages of real-time transaction monitoring for SAP.
Posted: 24 Sep 2008 | Published: 06 Feb 2009

Security Weaver

Effective Information Security: A Win-Win Proposition for the Enterprise and IT
sponsored by CA Technologies.
WHITE PAPER: In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility into and protection of their private and confidential data.
Posted: 02 Mar 2010 | Published: 25 Sep 2009

CA Technologies.

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
sponsored by BWise
EGUIDE: This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

BWise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement