Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed   
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software White Papers (View All Report Types)
1 - 25 of 71 Matches Previous Page  |  Next Page
The Total Economic Impact of Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.
Posted: 23 Oct 2020 | Published: 31 Aug 2020

Armor

IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 12 Oct 2020 | Published: 21 Jul 2020

ServiceNow

Manage Security Risk with Red Hat Insights
sponsored by Red Hat
WHITE PAPER: Access this white paper to learn about Red Hat Enterprise Linux, a tool that offers 5 key benefits for organizations looking to analyze, prioritize, and remediate issues as well as report their status.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Red Hat

The Risk Cloud
sponsored by LogicGate
WHITE PAPER: Approaches to risk management are shifting from reactive to proactive. Integrating risk management programs is a key to growth in today’s digital landscape. Many of the challenges involving risk, including lack of visibility and poor UX, can be solved through a more agile approach. Read this white paper to learn about the Risk Cloud and agile GRC.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

LogicGate

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

It’s All About the Data
sponsored by Tala Security
WHITE PAPER: Online retailers are quickly realizing that enhanced user experience often comes at the cost of security – but that doesn’t necessarily need to be the case. In this blog post, take a closer look at the challenges, risks and opportunities as they related to data privacy and security.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020

Contrast Security

Reclaim Your Compliance Training
sponsored by Cornerstone OnDemand
WHITE PAPER: Download this white paper to learn how you can reclaim compliance training and move past negative connotations to get more value out of it.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Cornerstone OnDemand

The Financial Adviser's Guide to Compliant IM and Collaboration
sponsored by Smarsh
WHITE PAPER: The rise of collaboration platforms and the compliance requirements they bring with them are a symptom of a larger reality: Workplace communications are changing. Read on to learn how you add IM and collaboration platforms to a compliant ecosystem in your organization.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Regulatory Updates Roundup Of 10 Recent FINRA And SEC Violations And Penalties
sponsored by Smarsh
WHITE PAPER: Over the past year, the SEC and FINRA have been enforcing communications supervision compliance regulations throughout the financial services industry. In this white paper, discover 10 of the most notable violations from Smarsh's monthly Regulatory Update blog posts to review how they occurred.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

Retail & Ecommerce: Securing Your Brand and Locking in Consumer Confidence
sponsored by CyberArk Software, Inc
WHITE PAPER: The retail marketplace sector is facing a perfect storm of vulnerabilities. To address these vulnerabilities, organizations should implement an effective privileged access security strategy. In this white paper, learn how to create an action plan that can help your retail organization secure their privileged accounts and credentials.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

CyberArk Software, Inc

Navigating the path to secure micro-segmentation in hybrid and multi-cloud data centers
sponsored by Guardicore
WHITE PAPER: The path to implementing micro-segmentation isn't a straight line; without the right approach to discovering, understanding and controlling application flows you can encounter several challenges. In this solution brief, learn how Guardicore Centra Security Platform can help you successfully navigate the path to micro-segmentation in 3 steps.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Guardicore

ServiceNow Vendor Risk Management
sponsored by ServiceNow
WHITE PAPER: Download this white paper to learn about ServiceNow's Vendor Risk Management tool, which provides a means to facilitate stakeholder interactions, drive transparency and accountability, and effectively monitor vendor-related risks.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

ServiceNow

Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

The Adobe EchoSign advantage for financial services
sponsored by Adobe EchoSign
WHITE PAPER: E-signatures offer financial institutions sustainable competitive advantages while meeting high industry standards. Access this white paper to learn more.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Adobe EchoSign

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Using An E-Signature Solution To Save Time and Money
sponsored by Adobe EchoSign
WHITE PAPER: The following white paper explores the top 8 reasons why you should consider an e-signature solution for your organization. Learn how e-signatures can vastly improve the time to close deals, improve compliance, save capital, and much more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Adobe EchoSign

CFO Insights on Success: How Automation Can Help
sponsored by Concur Technologies
WHITE PAPER: The following white paper to explore the current challenges and bottlenecks that face CIOs and FDs at the financial year-end. Learn the importance of automation technology and how it can drastically improve visibility, reporting, and ultimately, a simpler year-end.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Concur Technologies
1 - 25 of 71 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info