Compliance Audits Reports

CW APAC, June 2020: Trend Watch - data protection
sponsored by TechTarget ComputerWeekly.com
EZINE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 08 Feb 2021 | Published: 11 Jun 2020

TechTarget ComputerWeekly.com

State of GDPR in mainland Europe
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 08 Feb 2021 | Published: 15 Nov 2019

TechTarget ComputerWeekly.com

Data protection rises up business agenda
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 08 Feb 2021 | Published: 17 Dec 2018

TechTarget ComputerWeekly.com

CW APAC, June 2020: Trend Watch - data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

TechTarget ComputerWeekly.com

State of GDPR in mainland Europe
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

TechTarget ComputerWeekly.com

Preparing for Personal Data Privacy Policies
sponsored by Micro Focus
EGUIDE: As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.
Posted: 12 Jul 2019 | Published: 10 Jul 2019

Micro Focus

EU GDPR Compliance puts Focus on Data Tracking, Encryption
sponsored by The Media Trust
EGUIDE: GDPR compliance is mandatory by May 25, 2018. Discover how encryption will be an overlooked but key part in compliance, as well as how to reduce risk by avoiding keeping more personal data than is necessary for business/legal needs.
Posted: 26 Jun 2017 | Published: 22 Jun 2017

The Media Trust

How to Keep Cloud Services Compliant with HIPAA Standards
sponsored by Actiance
EGUIDE: In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Actiance

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Enterprise

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Optimize Value of Enterprise Software with App Usage Management
sponsored by Flexera Software
WHITE PAPER: Ensuring software license compliance and optimizing spend aren't easy -- complex agreements, virtualization, BYOD, and other trends make it difficult to understand and demonstrate compliance. But when you can't afford overspend on software, what can you do?
Posted: 25 Jun 2014 | Published: 28 Feb 2013

Flexera Software

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Top 10 Reasons Australian Businesses Automate Their Expenses
sponsored by Concur Technologies
WHITE PAPER: The following white paper explores the top 10 reasons why businesses need to consider automating their travel and expense management processes. Learn how you can gain 28% faster approval processes, 22% greater policy compliance, 40% cost reduction, and more.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Concur Technologies

Revolutionizing Home Entertainment
sponsored by Adobe EchoSign
CASE STUDY: The following case study explores how by leveraging Adobe EchoSign, TiVo was able to remove days off their contract lifecycle, increased control and visibility into the workflow, as well as improved audit trails for their internal records. Read on to learn how you can achieve similar results.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Adobe EchoSign

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Transferring Data without Secure Protocols?
sponsored by Globalscape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

Globalscape

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
sponsored by Symantec Corporation
WEBCAST: View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation