Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
26 - 50 of 238 Matches Previous Page  |  Next Page
Securing Big Data Analytics
sponsored by comForte AG
WHITE PAPER: Not only are the uses and benefits of big data expanding, so are the environments where it is collected and analyzed. Increasingly, data is ending up in the hands of cybercriminals. In this white paper, learn more about this fundamentally different approach to protecting sensitive data.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

comForte AG

Global Payments Technology Company Achieves PCI Compliance
sponsored by comForte AG
CASE STUDY: An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

comForte AG

The Market of Data Loss Prevention
sponsored by Forcepoint
RESEARCH CONTENT: This research report provides an analysis of the market for data loss prevention, revealing top players, trail blazers, specials and mature players. Data loss prevention solutions provide electronic data supervision and management to help organizations prevent non-compliant information sharing. In this research report, explore key vendors.
Posted: 01 Apr 2019 | Published: 31 Oct 2018

Forcepoint

A Common Sense Approach for Assessing Third-Party Risk
sponsored by Expel
WHITE PAPER: Supply chain partners can be a weak link when it comes to security. Third-party assessments are a great way to manage that risk. But they can quickly become burdensome and create mountains of paperwork without necessarily improving security. In this white paper, explore Expel's 6-step third-party assessment process.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Expel

The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by comForte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

comForte AG

Mercury Processing Services International Secures Growth
sponsored by comForte AG
CASE STUDY: Mercury Processing Services needed a solution that would properly protect all types of data not just for the sake of compliance, but also so that they would have another layer of protection from potential hackers. In this case study, learn about Mercury's experience using comforte's SecurDPS to protect their data.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

comForte AG

How Mobile Devices Simplify Manufacturing Compliance and Risk Management
sponsored by Samsung Electronics
RESOURCE: The global footprint of many manufacturing companies makes compliance with mandatory regulations particularly challenging. In this article, explore some potential bottlenecks in production processes that present challenges for manufacturing compliance and how mobile devices can deliver efficiencies.
Posted: 29 Mar 2019 | Published: 11 Mar 2019

Samsung Electronics

Thailand's Government Savings Bank
sponsored by comForte AG
CASE STUDY: Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Enterprise Tokenization with SecurDPS
sponsored by comForte AG
WHITE PAPER: Organizations are investing more than ever to protect their sensitive data, to meet compliance demands and to manage risk that is associated with cyberattacks. In this white paper, learn about comforte's data protection suite which is a scalable and fault-tolerant enterprise tokenization and encryption solution enabling successful data protection.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Secure Your Business with Data Protection
sponsored by comForte AG
WHITE PAPER: Compliance rules and regulations require organizations to develop sound security strategies in order to protect their valuable data assets. In this white paper, learn about SecurDPS Enterprise which provides the technology to successfully protect any sensitive data. Explore the benefits of using SecurDPS Enterprise.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Leading Canadian Bank Achieves Compliance for Themselves and their Customers
sponsored by comForte AG
CASE STUDY: To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

comForte AG

Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften

Privacy and Data Protection Webinar Transcript
sponsored by PricewaterhouseCoopers
RESOURCE: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this webcast transcript, learn about challenges in privacy and data protection and how PwC meets these challenges head on.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

PricewaterhouseCoopers

How Passive Monitoring Can Streamline NERC CIP Compliance
sponsored by Forescout
EBOOK: The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards are a set of requirements designed to secure the assets required for operating North America's bulk electric system. In this e-book, learn how SilentDefense can help North-American utilities by saving considerable effort and money.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

A Guide to Simplifying Compliance with NIST SP 800-53 and 800-82
sponsored by Forescout
RESOURCE: NIST Special Publication (SP) 800-53r4 provides a catalog of security controls for federal information systems and organizations and a process for selecting controls to protect operations and organizations. In this resource, explore the provided table which presents NIST SP's security controls applicable to ICS networks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

IT Security New Analytics-Driven Model
sponsored by Splunk
RESEARCH CONTENT: Enterprises today must protect not only their own data, systems, and intellectual property, but also content shared by third-parties. Lapses can be very disruptive to an organization. In this research report, explore key findings from a survey on cybersecurity practices. Also explore tips for building a strong cybersecurity program.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

The GDPR Playbook for Data Teams
sponsored by Okera
WHITE PAPER: Prepare yourself to avoid a huge hit to your business's stability at the hands of GDPR. Read this white paper for 7 data-centric steps to protect yourself moving forward.
Posted: 21 Mar 2019 | Published: 31 Dec 2018

Okera

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by Forescout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Forescout

Forcepoint's CIO on GDPR Readiness: Get Stakeholders Aligned. Then Execute.
sponsored by Forcepoint
CASE STUDY: In this case study, learn how Forcepoint's leadership team needed to align on legal and security terminology in order to achieve GDPR compliance. Also, discover the steps that Forcepoint's CIO, Meerah Rajavel took to reach compliance.
Posted: 20 Mar 2019 | Published: 31 Dec 2018

Forcepoint

A Brief Guide to Securing Your Multi-Cloud
sponsored by Splunk Services UK Ltd
WHITE PAPER: As more organizations are shifting infrastructure and services to the cloud, more are adopting a multi-cloud strategy. In this white paper, learn what multi-cloud is, what it isn't, the benefits of embracing it and lastly, how you can secure multi-cloud with the right security strategy.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Splunk Services UK Ltd

Complying with CECL
sponsored by SAS
WHITE PAPER: The Financial Accounting Standards Board's Current Expected Credit Loss (CECL) standard introduces a new model for the recognition and measurement of credit losses for loans and debt securities. In this white paper, discover findings from the SAS/GARP survey which gauged lenders' progress and concerns in gearing up for the new model.
Posted: 19 Mar 2019 | Published: 26 Apr 2018

SAS

Hitachi Solutions
sponsored by Adobe Systems Incorporated
CASE STUDY: Hitachi Solutions was undergoing a significant evolution; they wanted to ensure their processes were optimized. In this case study, learn how Hitachi Solutions deployed Microsoft and Adobe solutions in-house to improve processes and better serve their customers.
Posted: 18 Mar 2019 | Published: 31 Dec 2018

Adobe Systems Incorporated

Cisco Enterprise Agreements
sponsored by Softchoice
WHITE PAPER: You need a predictable, straightforward way to buy, access, and manage software assets across your enterprise. Open this whitepaper to learn how Cisco is making that possible with the Cisco Enterprise Agreement (EA), which provides enterprise-wide coverage of predefined Cisco deployments.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

Softchoice

Are You Sending Data to Your Printers Securely? Find Out How.
sponsored by HP
RESOURCE: Any data that is sent between devices is vulnerable to an attack. Unsecured printers expose your business to the same data threats as your PCs. In this resource, find a checklist developed by The Center for Internet Security to help your organization better protect your printing environment.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

HP

Privacy and Data Protection Podcast
sponsored by Micro Focus & PwC
PODCAST: There is a lot more data at risk today than there has been in the past. This explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it. In this podcast, learn about challenges in privacy and data protection and how PwC meets these challenges head on.
Posted: 12 Mar 2019 | Premiered: Mar 7, 2019

Micro Focus & PwC
26 - 50 of 238 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement