Software  >   Applications Software  >   Enterprise Applications Software  >  

Security Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
Security Compliance Software Reports
 
Financial Services: Modern Big Data Architectures
sponsored by Red Hat
WHITE PAPER: Know your customer (KYC) policies and practices that are part of the response to anti-money laundering (AML) are becoming critical in meeting requirements of the US Patriot Act. Read this technology overview to learn about a solution for KYC and AML compliance.
Posted: 09 Mar 2015 | Published: 31 Jan 2015

Red Hat

The Unstructured Data Extinction: Automated Governance in the Digital Age
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Rapidly advancing technology is forcing big changes to companies' GRC practices. In this classroom, learn how modern technology is forcing companies to develop automated governance features to help ensure corporate data stays compliant and secure.
Posted: 02 Feb 2016 | Premiered: 02 Feb 2016

SearchCompliance.com

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Securing Collaborative Data
sponsored by IntraLinks, Inc
CASE STUDY: This case study explores how to secure remote users and manage documents to eliminate multiple versions and confusion.
Posted: 28 Apr 2015 | Published: 01 Apr 2015

IntraLinks, Inc

G-Cloud Report: Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Implementation Strategy
sponsored by ComputerWeekly.com
WHITE PAPER: The Data Centre Strategy, G-Cloud and Applications Store for Government Programme (hereafter the „G-Cloud Programme‟) are 3 of the 14 strands of the Government ICT Strategy.Phase 2 of the programme started in October 2009 and ran until the middle of February 2010.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Optimized Licence Management for the Datacenter
sponsored by Flexera Software
WHITE PAPER: Read this white paper and learn some of the datacentre licence management challenges, including heterogeneous and multi-platform environments, complex licence models, virtualization and more.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Flexera Software

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

How To Successfully Achieve Records Management Compliance and Strategy
sponsored by Iron Mountain
EGUIDE: The following e-guide, created by the experts at SearchCompliance.com, offers advice and tips on navigating the records management landscape as well as how to best assure records management compliance. Read on to learn more.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Iron Mountain

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement