Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Auditing (Compliance)

RSS Feed   
Auditing (Compliance) Reports
 
PandaLabs Annual Report 2018
sponsored by Panda Security
RESEARCH CONTENT: As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.
Posted: 31 Dec 2019 | Published: 30 Nov 2018

Panda Security

SecurDPS Discover and Classify
sponsored by Comforte AG
PRODUCT OVERVIEW: Data is becoming a highly valuable resource. As such, organizations are taking meticulous precautions in order to safeguard their data against attacks. This solution brief introduces SecurDPS Discover and Classify, designed to automate data discovery and classification to enhance network and data usage visibility – read on to learn more.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Comforte AG

Creating an Identity-aware Organization from Infrastructure to Users
sponsored by SailPoint Technologies
WHITE PAPER: Cybercriminals are no longer just hacking through your firewall to gain entry to your infrastructure. They have found another, easier path in – your users. In this white paper, learn how identity management is key to ensure a secure, compliant and efficient infrastructure.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

SailPoint Technologies

The 4 Levels of Automated Remediation
sponsored by DivvyCloud
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Smarter Data Protection with Machine Learning
sponsored by HelpSystems
WHITE PAPER: As data grows in its volume and value, organizations should ensure their data privacy capabilities are poised to address today’s cyberthreats and compliance requirements. Read this white paper and discover how machine learning and artificial intelligence can enhance data security programs.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

HelpSystems

Mapping Security For Your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data
sponsored by OpenText
WHITE PAPER: In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

OpenText
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences