Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 212 Matches Previous Page  |  Next Page
Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

Egress Protect
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: Email protection strategies often fall short of meeting the necessary compliance and security requirements to adequately secure sensitive data being shared. In this solution brief, explore the key features and capabilities of Egress Protect, designed to intelligently secure emails and large files with the appropriate level of security.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Egress Software Technologies Inc

Endpoint Controls
sponsored by Cybereason
PRODUCT OVERVIEW: In order to manage the modern cyberthreat landscape, organizations need security policies that ensure protection and compliance without impacting efficiency. This solution brief provides an overview of the key features of Cybereason Endpoint Security – read on to learn more.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Cybereason

Data Protection Compliance in the UK
sponsored by Zivver
EBOOK: GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Zivver

Tax Automation reduces costs and meets security and compliance requirements
sponsored by Pulsant
CASE STUDY: In this case study, follow Tax Automation, a tax software company based in the UK, as they partner with Pulsant to streamline the delivery and accessibility of their offerings through a transition towards a SaaS model. Read on to discover the Tax Automation’s challenges, required capabilities and results.
Posted: 20 Aug 2020 | Published: 20 Aug 2020


Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

Avoiding Data Leaks with Scalable Encryption and Access Controls
sponsored by Thales
PRODUCT OVERVIEW: Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Thales

The Business of Data Security: 4 Often Overlooked Security Considerations for SMBs
sponsored by Citrix
EBOOK: As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Where Law and Tech Will Collide in 2020
sponsored by RSA Conference
WEBCAST: The acceleration of “tech disruption” across all industries is exacerbating privacy risks to consumers globally. NIST has released draft privacy controls, providing guidance for companies to manage privacy risks. Watch this RSA Conference webinar to see industry experts discuss where technology and the law might find friction in 2020.
Posted: 09 Jul 2020 | Premiered: Jan 7, 2020

RSA Conference

Cloud Migration Challenges
sponsored by BigID
PRODUCT OVERVIEW: Cloud migrations are nearing the point of necessity – even for highly regulated and risk-averse organizations. So, how can these organizations minimize risk, ensure data privacy and avoid costly disruptions? Read on to learn more about the challenges of cloud migration and how BigID is helping organizations overcome these obstacles.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

BigID

How to Ensure NIAP Mobile Application Compliance
sponsored by NowSecure
WHITE PAPER: Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

NowSecure

Understanding the Complexities of Digital OT Security
sponsored by Fortinet, Inc.
WHITE PAPER: To address growing vulnerabilities within their infrastructure, organizations often look to incorporate various point security tools to cover each new risk. However, this approach creates additional complexities and introduces a myriad of new security challenges. So, what’s the best path towards simplified cybersecurity? Read on to find out.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Fortinet, Inc.

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

Incorporating Technology to Mitigate Email Exploits and Human Error
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: Traditional email security approaches are no longer viable in today’s environment. In fact, a recent FBI study indicated that BEC generates more than 50% of all cybercrime revenue. Download this IDC Vendor Spotlight report for a closer look at Egress’ Intelligent Email Security offering, which uses machine learning to enhance threat readiness.
Posted: 10 Jun 2020 | Published: 31 May 2020

Egress Software Technologies Inc

The Business Case for Cloud Threat Defense
sponsored by Palo Alto Networks
WHITE PAPER: In order to protect the growing security and compliance requirements needed to protect cloud data and applications, organizations are implementing cloud threat defenses. Download this white paper to get a better understanding of the benefits, costs, issues and risks associated with implementing cloud threat defenses.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Palo Alto Networks

CW APAC, June 2020: Trend Watch - data protection
sponsored by ComputerWeekly.com
EZINE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 08 Jun 2020 | Published: 11 Jun 2020

ComputerWeekly.com

Modernize Your Approach to Compliance and Security
sponsored by Rackspace
RESOURCE: IT security and compliance are critical aspects for protecting today’s business environments. However, the global shortage of security professionals can make acquiring in-house cybersecurity expertise difficult. The following article provides expert guidance for overcoming today’s security and compliance challenges.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Rackspace

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

State of Software Security: Volume 10
sponsored by Veracode, Inc.
WHITE PAPER: For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

VMware Carbon Black Cloud Audit and Remediation
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Cloud Audit and Remediation, designed to deliver real-time assessment and remediation for faster, easier access to audit and reconfigure endpoints across their organization.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020

Contrast Security
1 - 25 of 212 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info