Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Auditing (Compliance)

RSS Feed   
Auditing (Compliance) Reports
 
Process Automation and Content Integration: Orion Registrar Case Study
sponsored by K2
CASE STUDY: In this case study, find out how Orion Registrar adopted a modern BPM platform in conjunction with SharePoint so that they could streamline auditing and certification processes, simplify reporting, increase compliance, and more.
Posted: 12 Mar 2018 | Published: 31 Dec 2017

K2

Guide to Compliant Archiving: Have Your Cake and Eat It Too in a Post-Email World
sponsored by Smarsh
WHITE PAPER: Despite the increased scope of data organizations need to capture and archive, new tools have simultaneously emerged to simplify and automate this process. Downloading this guide will assist you in achieving and maintaining compliance without impacting users' overall productivity.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Smarsh

Checklist to Address Key Data Requirements of NDB
sponsored by Fortinet, Inc.
EBOOK: Fines of the Australian Notifiable Data Breach Scheme (NDB) has captured the attention of IT security teams. Find out how you can get started with building a compliant security architecture.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

Fortinet, Inc.

GDPR & Online Proofing: An Inconvenient Truth
sponsored by Jumio
EBOOK: Companies around the world are busy implementing the necessary policies and procedures to ensure customer data is appropriately handled, in order to comply with GDPR. Keep reading to find out if your data processor is effectively managing and exceeding the standards laid out in GDPR.
Posted: 14 Jun 2018 | Published: 14 Jun 2018

Jumio

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Strategies for Writing a HIPAA-friendly BYOD Policy
sponsored by HP & IntelĀ®
EGUIDE: This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
Posted: 01 Aug 2013 | Published: 05 Mar 2013

HP & IntelĀ®

How a Top 10 Bank Uses A Data Analytics Tool to Manage Operational Risk
sponsored by Infogix
WHITE PAPER: In this case study, learn about the analytics tool a top 10 U.S. Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including reduced costs while increasing productivity, processed full audit in real time, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2014

Infogix

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement