Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
1 - 25 of 232 Matches Previous Page  |  Next Page
5 Ways Growing Companies Get Tripped Up by Sales Tax
sponsored by Avalara
WHITE PAPER: In this white paper, find 5 activities that high growth companies undertake that can be a roadblock to sales tax compliance and how a tax automation software can help.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avalara

Business Expansion and Sales Tax Nexus
sponsored by Avalara
WHITE PAPER: Planting your company flag in fertile new ground is one way to expand your business. But it can also bring up a crop of new compliance issues. This white paper will help you prepare for dealing with new tax requirements that spring up from growth.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avalara

Assessing the Security and Compliance Posture of an AWS Account and Its Assets
sponsored by CloudPassage
VIDEO: CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.
Posted: 10 Oct 2019 | Premiered: 10 Oct 2019

CloudPassage

Unified Data Protection for Hybrid IT: Part 1
sponsored by Forcepoint
WEBCAST: Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In this webinar, explore how companies should rethink data security by focusing on the 3 main principles including analytics-driven visibility, risk-adaptive controls and intelligence & dynamic automation.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Forcepoint

Modernizing Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property – all while adapting to evolving IT environments. In this webcast, Angelica Torres-Corral discusses how to gain visibility and control of your data, optimize a DLP solution, and more.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Forcepoint

How To Achieve And Maintain Compliance For Your Organization's Electronic Communications Data
sponsored by Smarsh
WHITE PAPER: When it comes to the rapid adoption of modern communication and collaboration tools, it's imperative organizations get ahead of capturing and archiving significant volumes of data. In this white paper, learn how to address common compliance challenges that are associated with electronic communications data.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Smarsh

Regulatory Updates Roundup Of 10 Recent FINRA And SEC Violations And Penalties
sponsored by Smarsh
WHITE PAPER: Over the past year, the SEC and FINRA have been enforcing communications supervision compliance regulations throughout the financial services industry. In this white paper, discover 10 of the most notable violations from Smarsh's monthly Regulatory Update blog posts to review how they occurred.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Security Podcast: Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
PODCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this podcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Is Fax the Achilles Heel of Your Compliance and Cybersecurity Plan
sponsored by J2 Cloud Services
WEBCAST: Today, many organizations have little to no security and compliance strategies for fax machines, printers or services. This represents a very real vulnerability. In this webcast, Aaron Goldberg, CEO of Content 4 IT and Brad Spannbauer, Senior Director of Product Management at J2 Cloud Services, discuss 5 fax security disasters in the making.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

J2 Cloud Services

Detecting and Preventing Cybercrime and Fraud
sponsored by Concur Technologies
WHITE PAPER: In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Concur Technologies

How Do You Cultivate Compliance to Protect Your Business?
sponsored by Concur Technologies
WHITE PAPER: Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Concur Technologies

Australian Bureau of Statistics Achieves Compliance Rates of over 99%
sponsored by Concur Technologies
CASE STUDY: How did the Australian Bureau of Statistics (ABS) overcome the problems posed by their multiple disparate systems to achieve compliance rates of over 99%? View this case study to find out more, and learn about Concur's role in their transformation.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Concur Technologies

Is Your Company In Peril If Critical Data Is Breached?
sponsored by IBM
ANALYST REPORT: Delegating data security to IT teams does not absolve the responsibility business leaders have to protect data. Forrester Consulting surveyed 150 IT, security, and risk decision makers and examined their approach to protecting their company's critical data. Download this report to explore key findings.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

IBM

Secure Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Protect Your Business-Critical Applications in the Cloud
sponsored by Onapsis
PRODUCT OVERVIEW: Moving your business-critical applications to the cloud has many benefits including cost savings and agility. However, you need visibility and insights into your cloud environment to ensure security and compliance. In this brief, learn how Onapsis can help your organization prepare for potential cyberattacks, compliance audits, and more.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Preparing for the Compliance Audit
sponsored by SentryOne LLC
WEBCAST: With a surplus of frequently evolving regulations to meet, performing regular compliance audits can be a good way to help avoid harmful fees and fines. Watch this webinar to find out how SentryOne can help audit your data compliance standings across any number of SQL Server databases.
Posted: 14 Aug 2019 | Premiered: Aug 14, 2019

SentryOne LLC

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Key Considerations for Compliance in the Cloud
sponsored by Virtru
RESOURCE: Data is the mission-critical information that keeps your business running. So it should come as no surprise that organizations are regularly targeted by cybercriminals in an effort to steal data. In this infographic, learn how Virtu's encryption and access management solution ensures data security in the cloud, and facilitates compliance in 4 ways.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

Seamless Transition to CUI Markings
sponsored by TITUS
PRODUCT OVERVIEW: While it is critical to set standardized controls for the way information is handled, the process of implementing CUI markings is complex, time-consuming, and sometimes unclear. In this solution brief, learn how Titus data protection solutions can help organizations to ensure they meet CUI requirements.
Posted: 02 Aug 2019 | Published: 30 Jun 2019

TITUS

Titus Military Classification for NATO Security Compliance
sponsored by TITUS
PRODUCT OVERVIEW: In recent years, intelligence and military communities have begun to embrace the need for sharing critical information with allies. In this solution brief, learn how Titus provides a common classification and policy solution that enables information-sharing in a way that minimizes the risk of compromise.
Posted: 01 Aug 2019 | Published: 30 Jun 2019

TITUS

Addressing Challenges in Hybrid Cloud Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 31 Jul 2019 | Published: 31 Jul 2019

Trend Micro, Inc.

Your Compliance Action Plan: Strategies To Control Time, Cost And Risk For Financial Services Firms
sponsored by Mimecast
WEBCAST: Financial services firms today face some of the most complex and onerous regulatory and legal challenges in the world. In this webcast, listen as Michael Osterman and Garth Landers guide financial services firms in navigating a clear and strategic path through the complex requirements they face to support governance requirements.
Posted: 31 Jul 2019 | Premiered: Jul 31, 2019

Mimecast
1 - 25 of 232 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement