Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits White Papers (View All Report Types)
1 - 25 of 123 Matches Previous Page  |  Next Page
Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

Privacy by Design: The Key to Unlock Your Compliance Strategy
sponsored by Immuta, Inc
WHITE PAPER: Privacy by Design (PbD), and its EU version Data Protection by Design (DPbD), aim to implement privacy controls from the outset. In this white paper, explore the beginnings of a framework for operationalizing PbD.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Immuta, Inc

Managing Exempt Sales During the Rise of Economic Nexus
sponsored by Avalara
WHITE PAPER: If you sell products or services that are exempt from sales tax, your compliance challenges can be more complex. In the event of a sales tax audit, you must prove that your exempt sales are backed by valid documentation. In this white paper, learn how economic nexus may impact your exempt sales and overall sales tax compliance picture.
Posted: 02 Aug 2019 | Published: 02 Aug 2019

Avalara

What the South Dakota v. Wayfair, Inc. decision may mean for your business
sponsored by Avalara
WHITE PAPER: A lot of business activities can cause your business to have nexus, but economic nexus is getting a lot of attention right now because it was at the forefront of the South Dakota v. Wayfair court case. In this white paper, learn everything you need to know from the South Dakota v. Wayfair court case.
Posted: 01 Aug 2019 | Published: 30 Apr 2019

Avalara

Digital Transformation and Tax Compliance
sponsored by Avalara
WHITE PAPER: In this white paper, explore the differences in how cloud vs. on-premises solutions handle sales and use tax compliance. Also, learn how Avalara can help organizations navigate to the cloud while remaining compliant.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Avalara

Addressing Challenges in Hybrid Cloud Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Trend Micro, Inc.

Online Sellers Guide to 2019 Sales Tax Changes
sponsored by Avalara
WHITE PAPER: 2019 is another big year for sales tax changes. Online sellers can feel the impact of these changes as economic nexus laws expands tax collection obligations for compliance. In this white paper, learn more about the impacts of economic nexus laws and what it means for online sellers.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Avalara

5 Steps for Managing Compliance With Exempt Sales
sponsored by Avalara
WHITE PAPER: As your business evolves your sales tax obligations may also change. Without a comprehensive plan in place, selling exempt products or services can compound your compliance challenges. In this white paper, explore 5 steps all businesses should take to ensure they're compliant at every stage of the exemption certificate management process.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

Avalara

SOC 2 Network Security Compliance for Kubernetes Platforms
sponsored by Tigera
WHITE PAPER: System and Organization Controls (SOC) is a set of criteria developed by the American Institute of CPAs. Specifically, SOC Type 2 or SOC 2 offers guidance and certification for companies that handle sensitive customer data. In this white paper, explore challenges with meeting the SOC 2 security criteria on Kubernetes and how Tigera can help.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

Tigera

Data Protection by Design
sponsored by Immuta, Inc
WHITE PAPER: Data Protection by Design (DPbD) is the core data protection requirement introduced by the GDPR. And yet despite DPbD's centrality to the GDPR, it receives scant attention. Why? It's quite difficult to implement because it consists of many different requirements. In this white paper, explore what the DPbD is and why it's central to the GDPR.
Posted: 15 Jul 2019 | Published: 15 Jul 2019

Immuta, Inc

Salesforce Data Protection Through User Activity Monitoring
sponsored by FairWarning
WHITE PAPER: Salesforce holds a vast amount of regulated, proprietary and confidential information. But as data theft trends increase, a better way to protect this information is needed. In this white paper, gain a better understanding of the need for Salesforce data protection and user activity monitoring.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

FairWarning

Testing for Compliance Just Became Easier
sponsored by Cymulate
WHITE PAPER: Compliance regulations originated as efforts to ensure data security, but they have morphed into overwhelming challenges for IT and security teams. In this white paper, learn how Cymulate's Breach and Attack Simulation can ensure your organization is audit-ready while also measuring the level of risk across your threat vectors and infrastructure.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Cymulate

PCI Network Security Compliance For Kubernetes Platforms
sponsored by Tigera
WHITE PAPER: PCI DSS requires proper monitoring at the network level. The challenge with traditional network monitoring tools is that they generate inaccurate data for Kubernetes. In this white paper, learn how Tigera supports continuous PCI compliance that gives teams the ability to pinpoint any point in time and say with certainty if they were in compliance.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

5 Best Practices for Kubernetes Network Security and Compliance
sponsored by Tigera
WHITE PAPER: As businesses look to modernize their applications, many have turned to Kubernetes because of the benefits containerized workloads bring. However, businesses need to think about securing their applications. In this white paper, explore 5 best practices for securing Kubernetes at the network level.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

The Practical Executive's Guide to Data Loss Prevention
sponsored by Forcepoint
WHITE PAPER: There has been much confusion in the marketplace regarding data loss prevention (DLP) controls. As a result, organizations that want to protect their confidential data and comply with laws and regulations are often unsure where to turn. In this white paper, explore a 9-step process for implementing and executing a data protection strategy.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Forcepoint

Security Maturity: Mapping the Road to Resilience in Europe
sponsored by Dell SecureWorks
WHITE PAPER: The road to cybersecurity maturity can be tricky. This is because there isn't one universal standard by which management can determine how well the risk is being managed. For European organizations, reviewing the highlights in this white paper can provide clues for comparing their own cybersecurity maturity to that of other EMEA organizations.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

Smarter Data Protection with Machine Learning
sponsored by TITUS
WHITE PAPER: Protecting sensitive data is critical, but it can be difficult to achieve without first enhancing how data is kept. Many organizations struggle to accurately identify complex data as it moves throughout workflows. In this white paper, learn how machine learning offers a way for organizations to better protect their sensitive data.
Posted: 20 May 2019 | Published: 30 Nov 2018

TITUS

Compliance Needs Drive Data Access Auditing Requirements
sponsored by BMC
WHITE PAPER: More and more regulations are being passed that dictate increased effort be exerted to better secure and protect the accuracy and privacy of enterprise data. So how can organizations ensure they are in compliance with these regulations (and others)? Download this white paper for 4 data access auditing techniques to help maintain compliance.
Posted: 16 May 2019 | Published: 16 May 2019

BMC

Access & Protect Your Data – Anywhere, Anytime
sponsored by TITUS
WHITE PAPER: The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

The Sharing Economy - The 7 Challenges of Online Identity Verification
sponsored by Evident
WHITE PAPER: The absence of a standardized, fully reliable method of verifying the identity of participants and equipping them to prove the authenticity of their credentials could pose a real challenge to the success of sharing economy participants. In this white paper, examine 7 major hurdles to effective and consistent online identity verification.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Evident

Comparing Tape and Cloud Storage for Long-Term Data Preservation
sponsored by Fujifilm Recording Media USA, Inc.
WHITE PAPER: This white paper considers the benefits of a hybrid archiving strategy consisting of both tape and cloud, taking into account reliability, security, retrieving data, and expected future costs. Read on to see how capitalizing on the strengths of the two media may improve your company's long-term data retention.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Fujifilm Recording Media USA, Inc.
1 - 25 of 123 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement