Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Auditing (Compliance)

RSS Feed   
Auditing (Compliance) Reports
 
Your Compliance Action Plan: Strategies To Control Time, Cost And Risk For Financial Services Firms
sponsored by Mimecast
WEBCAST: Financial services firms today face some of the most complex and onerous regulatory and legal challenges in the world. In this webcast, listen as Michael Osterman and Garth Landers guide financial services firms in navigating a clear and strategic path through the complex requirements they face to support governance requirements.
Posted: 31 Jul 2019 | Premiered: Jul 31, 2019

Mimecast

The Sharing Economy - The 7 Challenges of Online Identity Verification
sponsored by Evident
WHITE PAPER: The absence of a standardized, fully reliable method of verifying the identity of participants and equipping them to prove the authenticity of their credentials could pose a real challenge to the success of sharing economy participants. In this white paper, examine 7 major hurdles to effective and consistent online identity verification.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Evident

eDiscovery Success Starts at the Beginning
sponsored by Mimecast
ANALYST REPORT: IDC spotlights a real-time eDiscovery repository in this report that is searchable and optimized with analytics. Read the report for the top 5 benefits of this tool and to learn how it eliminates several significant eDiscovery challenges.
Posted: 31 Jul 2019 | Published: 31 Dec 2018

Mimecast

Securing Big Data Analytics
sponsored by Comforte AG
WHITE PAPER: Not only are the uses and benefits of big data expanding, so are the environments where it is collected and analyzed. Increasingly, data is ending up in the hands of cybercriminals. In this white paper, learn more about this fundamentally different approach to protecting sensitive data.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Comforte AG

Wildflower Health Case Study
sponsored by Data Theorem
CASE STUDY: Wildflower helps families manage their health needs on one shared mobile application. However, the development team was facing both regulatory compliance and customer demand issues, as their apps process sensitive HIPAA-regulated data. In this case study, learn how Wildflower was able to achieve security coverage of all their mobile apps.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

The Difference Between Format-Preserving Encryption and Tokenization
sponsored by Comforte AG
RESOURCE: Format-preserving encryption (FPE) and tokenization have similar objectives, but the difference between the 2 can be confusing at times. Download this resource for a brief overview of both the similarities and differences between these 2 data-centric security methods. Also, explore examples of when 1 method might be used instead of the other.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Comforte AG

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by Comforte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Comforte AG

A Holistic Approach To Identity And Authentication
sponsored by HID Global
WHITE PAPER: As the ways to access your organization and its sensitive data increase, so does the potential for breaches via your physical and technology access points. So, how do you make sure the person who wants access is who they say they are? In this white paper, learn how to protect your organization using a variety of authentication methods.
Posted: 11 Apr 2019 | Published: 23 Feb 2018

HID Global

Compliance Needs Drive Data Access Auditing Requirements
sponsored by BMC
WHITE PAPER: More and more regulations are being passed that dictate increased effort be exerted to better secure and protect the accuracy and privacy of enterprise data. So how can organizations ensure they are in compliance with these regulations (and others)? Download this white paper for 4 data access auditing techniques to help maintain compliance.
Posted: 16 May 2019 | Published: 16 May 2019

BMC

How to Keep Cloud Services Compliant with HIPAA Standards
sponsored by Actiance
EGUIDE: In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Actiance
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement