Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 238 Matches Previous Page  |  Next Page
Process Automation and Content Integration: Orion Registrar Case Study
sponsored by K2
CASE STUDY: In this case study, find out how Orion Registrar adopted a modern BPM platform in conjunction with SharePoint so that they could streamline auditing and certification processes, simplify reporting, increase compliance, and more.
Posted: 12 Mar 2018 | Published: 31 Dec 2017

K2

Meet Compliance Requirements for Network and Data Security
sponsored by HP
WHITE PAPER: Although many IT departments rigorously apply security measures to computers and the network, printing and imaging devices are often overlooked. But printers can provide an entry to your network, and securing them is just as important. This white paper reveals recommendations for print and document security so you can meet compliance regulations.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

HP

If You Think Compliance is Expensive, Try Violations
sponsored by Oracle
WHITE PAPER: You don't need to be a victim of a cyberattack for your information systems to be on the wrong side of compliance regulations. Explore this white paper to discover how to prepare your sensitive data in the cloud for compliance regulations.
Posted: 07 Mar 2018 | Published: 07 Mar 2018

Oracle

Is Compliance Being Left to Chance?
sponsored by Oracle
WHITE PAPER: Tap into this resource to learn how cloud and AI technologies may hold the key to managing compliance and security in a clear, consistent, and efficient way.
Posted: 06 Mar 2018 | Published: 06 Mar 2018

Oracle

Governance, Risk, and Compliance: The Business and IT Challenge
sponsored by ServiceNow
RESOURCE: This resource reveals the 6 benefits of the ServiceNow Governance, Risk, and Compliance (GRC) unified platform. Learn how to effectively respond to security risks in real-time through continuous monitoring, prioritization and automation and uncover key use cases.
Posted: 20 Feb 2018 | Published: 20 Feb 2018

ServiceNow

Reduce Your Audit Tax: Five Methods to Lessen the Burdens
sponsored by Lynx Technology Partners
WHITE PAPER: The security and regulatory environment these days has mushroomed to the point that very few organizations ever go untouched by the auditor's viewfinder. Access this resource to uncover the 5 steps to developing and implementing an audit tax strategy for greater automation of data collection and reporting.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

Five Milestones to GDPR Success
sponsored by Proofpoint, Inc.
VIDEO: The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.
Posted: 06 Feb 2018 | Premiered: 06 Feb 2018

Proofpoint, Inc.

Mastering Compliance, Audits and Disaster Recovery Planning with Veeam
sponsored by Veeam Software
WHITE PAPER: Click inside and learn how the Veeam Availability Suite may be able to provide the kind of service needed to achieve compliance with new backup and recovery regulations like the ISO 27000 family.
Posted: 29 Jan 2018 | Published: 30 Dec 2016

Veeam Software

Automating GDPR Compliance for Network Monitoring and Security Infrastructure
sponsored by Big Switch Networks
WHITE PAPER: Is your network ready for May 25, 2018? Access this white paper to gain valuable insights into how to leverage Big Monitoring Fabric to reveal the benefits of network visibility for all monitoring and security tools, while simplifying and automating regulatory GDPR compliance.
Posted: 25 Jan 2018 | Published: 25 Jan 2018

Big Switch Networks

The Journey to Creating Value from the GDPR
sponsored by IBM
WHITE PAPER: Learn about the key steps on the journey to creating value from the GDPR with a strategy for building sustainable, governed data flows.
Posted: 31 Oct 2017 | Published: 31 Mar 2017

IBM

Learning to Love GDPR
sponsored by Box
EBOOK: Coverage on GDPR has largely been negative but the regulation is really an opportunity to get your company's data privacy and content management in order, and in turn, positively impact business outcomes. Learn more about GDPR and how to prep your cloud content management strategy.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Box

The Life-Changing Magic of Information Governance
sponsored by Box
WHITE PAPER: Learn how to create effective information governance with 3 keys to manage even cloud-based content soundly and securely throughout its entire lifecycle.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Box

Key Issues for E-Discovery and Legal Compliance
sponsored by Smarsh
WHITE PAPER: Managers are often worried their organizations will be sued at some point, but most aren't adequately prepared to deal with e-discovery issues. In this Osterman Research report, uncover insight from the results of an in-depth survey of decision makers and influencers at mid-sized and large organizations.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Smarsh

Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

The Top 3 Obstacles to GDPR Compliance
sponsored by Infogix
RESOURCE: Discover the top 3 obstacles to GDPR compliance and find out how an enterprise-wide data governance program that incorporates analytics and KPIs for validating personal data quality can help you comply with GDPR regulations.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Infogix

Achieving GDPR Compliance with Data Governance
sponsored by Infogix
WHITE PAPER: Discover how to meet GDPR compliance requirements with an organization-wide data governance program that relies on collaboration, shared accountability, machine learning analytics, and enhanced data visualizations.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Infogix

EU GDPR Compliance puts Focus on Data Tracking, Encryption
sponsored by The Media Trust
EGUIDE: GDPR compliance is mandatory by May 25, 2018. Discover how encryption will be an overlooked but key part in compliance, as well as how to reduce risk by avoiding keeping more personal data than is necessary for business/legal needs.
Posted: 26 Jun 2017 | Published: 22 Jun 2017

The Media Trust

SAM specialists facing challenges covering all the bases
sponsored by Flexera Software
EGUIDE: Software vendors are now auditing their customers more and more, but only 29% of firms are monitoring their systems for vendor contract compliance. Access this eGuide to learn how your Software Asset Management solution must evolve to cover any potential gaps that may currently exist in your organization.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Flexera Software

University of Kansas Hospital Case Study
sponsored by Cisco Umbrella
CASE STUDY: Unlike many standard hospitals, a university hospital has to protect student data and large quantities of intellectual property alongside patient data. Access this case study to learn how The University of Kansas Hospital did all this while shortening investigation time and increasing visibility.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Cisco Umbrella

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration
sponsored by Dell Software
EGUIDE: This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE: Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

Dell Software

Compliance - The New Hot Button for CIOs
sponsored by VMware
WHITE PAPER: This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.
Posted: 16 Aug 2016 | Published: 01 Jan 2016

VMware

How a Top 10 Bank Uses A Data Analytics Tool to Manage Operational Risk
sponsored by Infogix
WHITE PAPER: In this case study, learn about the analytics tool a top 10 U.S. Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including reduced costs while increasing productivity, processed full audit in real time, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2014

Infogix

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire
1 - 25 of 238 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement