Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Auditing (Compliance)

RSS Feed   
Auditing (Compliance) Reports
 
Wildflower Health Case Study
sponsored by Data Theorem
CASE STUDY: Wildflower helps families manage their health needs on one shared mobile application. However, the development team was facing both regulatory compliance and customer demand issues, as their apps process sensitive HIPAA-regulated data. In this case study, learn how Wildflower was able to achieve security coverage of all their mobile apps.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

10 Best Practices for Data Archiving and Application Decommissioning
sponsored by Flatirons Digital Innovations
WHITE PAPER: To learn how to successfully archive and decommission legacy applications, download this paper. It shares 10 proven practices to help you in the process while avoiding common pitfalls.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Flatirons Digital Innovations

Thailand's Government Savings Bank
sponsored by comForte AG
CASE STUDY: Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Market Guide for Data Masking
sponsored by Micro Focus
WHITE PAPER: Security and risk management leaders should use data masking to desensitize or protect sensitive data. Privacy regulations, such as the GDPR, in particular, continue to drive strong interest in this technology market. In this white paper, discover key findings from Gartner's research and review recommendations for all organizations.
Posted: 06 Feb 2019 | Published: 20 Jul 2018

Micro Focus

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by comForte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by comForte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

comForte AG

How to Strengthen Your Vendor Risk Management Strategy Through Automation
sponsored by BitSight
RESOURCE: To reduce third-party cyber-risk organizations need processes and solutions that leverage automation. In this resource, Stephen Boyer, CTO of BitSight, explains how organizations can incorporate automation to develop more mature vendor risk management programs.
Posted: 23 May 2019 | Published: 23 May 2019

BitSight

Halton Borough Council Supports Vulnerable Citizens with Veeam Intelligent Data Management
sponsored by Veeam Software
CASE STUDY: The challenge of ensuring exponentially increasing volumes of data are properly backed up is one which many enterprises can appreciate. To discover how Halton Borough Council ultimately achieved reliable, GDPR-compliant backups without draining vital resources, access the study now.
Posted: 22 May 2019 | Published: 22 May 2019

Veeam Software

Secure Your Business with Data Protection
sponsored by comForte AG
WHITE PAPER: Compliance rules and regulations require organizations to develop sound security strategies in order to protect their valuable data assets. In this white paper, learn about SecurDPS Enterprise which provides the technology to successfully protect any sensitive data. Explore the benefits of using SecurDPS Enterprise.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Data Protection Ascends the Business Agenda
sponsored by ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement