Software  >   Applications Software  >   Enterprise Applications Software  >  

Security Compliance Software

RSS Feed   
Security Compliance Software White Papers (View All Report Types)
 
Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Founding Principles
sponsored by ComputerWeekly.com
WHITE PAPER: The overriding goals for Data Centre Consolidation, the G-Cloud and the Applications Store for Government are:Reduce ICT costs;Provide open competition and create a vibrant marketplace enabling the best product at the best price;Create flexibility.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Software Audit Response Guide
sponsored by ClearEdge
WHITE PAPER: When you get audited, it's important to take appropriate steps and set the proper tone at the outset. Seemingly innocuous actions and omissions on your company's part can create significant downside in the findings from a software licensing audit. Get a Software Audit Checklist that lays out "7 Dos & 7 Don'ts" to survive your next audit.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

ClearEdge

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Data Center Designs to Help Meet Your Compliance Challenge
sponsored by Iron Mountain
WHITE PAPER: This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Guide: Enterprise Security Reporter
sponsored by ScriptLogic Corporation
WHITE PAPER: In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Hedge Funds: Why Comply? - A Practical Guide to Developing a Culture of Compliance
sponsored by Advent Software, Inc
WHITE PAPER: This white paper written by Advent Software outlines how hedge funds can create a "culture of compliance" with best practice ideas for accurate record keeping and reporting, transparency in operations and, putting the interests of investors first.
Posted: 10 Jul 2008 | Published: 01 Jan 2006

Advent Software, Inc

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences