Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed   
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance Audits Reports
76 - 100 of 246 Matches Previous Page  |  Next Page
How Mobile Devices Simplify Manufacturing Compliance and Risk Management
sponsored by Samsung Electronics
RESOURCE: The global footprint of many manufacturing companies makes compliance with mandatory regulations particularly challenging. In this article, explore some potential bottlenecks in production processes that present challenges for manufacturing compliance and how mobile devices can deliver efficiencies.
Posted: 29 Mar 2019 | Published: 11 Mar 2019

Samsung Electronics

Thailand's Government Savings Bank
sponsored by Comforte AG
CASE STUDY: Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Enterprise Tokenization with SecurDPS
sponsored by Comforte AG
WHITE PAPER: Organizations are investing more than ever to protect their sensitive data, to meet compliance demands and to manage risk that is associated with cyberattacks. In this white paper, learn about comforte's data protection suite which is a scalable and fault-tolerant enterprise tokenization and encryption solution enabling successful data protection.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Secure Your Business with Data Protection
sponsored by Comforte AG
WHITE PAPER: Compliance rules and regulations require organizations to develop sound security strategies in order to protect their valuable data assets. In this white paper, learn about SecurDPS Enterprise which provides the technology to successfully protect any sensitive data. Explore the benefits of using SecurDPS Enterprise.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Leading Canadian Bank Achieves Compliance for Themselves and their Customers
sponsored by Comforte AG
CASE STUDY: To achieve PCI compliance while reducing the risk of data breaches and potential fraud, a Canadian bank implemented comforte's platform which replaced sensitive data with tokens to render it unreadable anywhere stored. In this case study, explore the benefits the bank saw after implementing comforte.
Posted: 27 Mar 2019 | Published: 27 Mar 2019

Comforte AG

Security and Compliance Fears Keep Companies from Cloud Migration
sponsored by Ziften
RESOURCE: Migrating parts of your IT operations to the cloud can seem like a huge chore, and a dangerous one at that. There are a lot of security issues to deal with when migrating to the cloud. In this article, learn about how to keep your environment secure before, during and after a cloud migration.
Posted: 25 Mar 2019 | Published: 27 Feb 2019

Ziften

The GDPR Playbook for Data Teams
sponsored by Okera
WHITE PAPER: Prepare yourself to avoid a huge hit to your business's stability at the hands of GDPR. Read this white paper for 7 data-centric steps to protect yourself moving forward.
Posted: 21 Mar 2019 | Published: 31 Dec 2018

Okera

A Brief Guide to Securing Your Multi-Cloud
sponsored by Splunk
WHITE PAPER: As more organizations are shifting infrastructure and services to the cloud, more are adopting a multi-cloud strategy. In this white paper, learn what multi-cloud is, what it isn't, the benefits of embracing it and lastly, how you can secure multi-cloud with the right security strategy.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Splunk

Log Management Essentials
sponsored by One Identity
WHITE PAPER: In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Hitachi Solutions
sponsored by Adobe Systems Incorporated
CASE STUDY: Hitachi Solutions was undergoing a significant evolution; they wanted to ensure their processes were optimized. In this case study, learn how Hitachi Solutions deployed Microsoft and Adobe solutions in-house to improve processes and better serve their customers.
Posted: 18 Mar 2019 | Published: 31 Dec 2018

Adobe Systems Incorporated

Cisco Enterprise Agreements
sponsored by Softchoice
WHITE PAPER: You need a predictable, straightforward way to buy, access, and manage software assets across your enterprise. Open this whitepaper to learn how Cisco is making that possible with the Cisco Enterprise Agreement (EA), which provides enterprise-wide coverage of predefined Cisco deployments.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

Softchoice

Laying the Foundation for GDPR Compliance
sponsored by SentryOne LLC
WHITE PAPER: The GDPR is in effect but, many businesses are still struggling with how to properly implement protections across systems and processes. This white paper discusses the 4 key rights that European citizens have under GDPR, and what businesses need to do to ensure they are GDPR compliant.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

SentryOne LLC

10 Best Practices for Data Archiving and Application Decommissioning
sponsored by Flatirons Digital Innovations
WHITE PAPER: To learn how to successfully archive and decommission legacy applications, download this paper. It shares 10 proven practices to help you in the process while avoiding common pitfalls.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Flatirons Digital Innovations

Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017

Trend Micro, Inc.

Re-architecting Data Protection Infrastructure for Hybrid IT
sponsored by Rubrik
EBOOK: This e-book will help you prepare to evolve your data protection infrastructure, including coverage on how to reduce data protection TCO (without compromising security), rethinking backup for ransomware and GDPR policies, and why the cloud holds much promise for data protection.
Posted: 07 Jan 2019 | Published: 07 Jan 2019

Rubrik

Data Protection Ascends the Business Agenda
sponsored by ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

ComputerWeekly.com

Data Archiving: Project Briefs
sponsored by Flatirons Digital Innovations
EBOOK: This 24-page collection of project briefs provides a snapshot of how to use archiving' tools to assist in decommissioning legacy systems. Read on for the challenges presented in each project, as well as the results and benefits of combining archiving and systems decommissioning initiatives.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Flatirons Digital Innovations

Guide to Compliant Archiving: Have Your Cake and Eat It Too in a Post-Email World
sponsored by Smarsh
WHITE PAPER: Despite the increased scope of data organizations need to capture and archive, new tools have simultaneously emerged to simplify and automate this process. Downloading this guide will assist you in achieving and maintaining compliance without impacting users' overall productivity.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Smarsh

Bank Achieves $5 Million in Annual Savings Through Data Archiving and App Decommissioning
sponsored by Flatirons Digital Innovations
CASE STUDY: This year, BMO Harris Bank earmarked over 100 apps for retirement. Read on to learn the path by which BMO extracted their data from legacy applications that needed decommissioning and archived it to a central repository where it could be retained and accessed in a fully compliant manner.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Flatirons Digital Innovations

Compliance Matters: How New Laws Are Affecting Your Bottom Line
sponsored by Kronos
VIDEO: Due to a lack of federal guidance, many state legislatures have taken it upon themselves to enact state laws to support labor initiatives. Watch this webcast to learn about current rules and regulations and how they're affecting businesses, and explore an HR platform that can help you maintain compliance.
Posted: 04 Oct 2018 | Premiered: 28 Sep 2018

Kronos

State Compliance Guide: Navigating State and Local Labor Regulations
sponsored by Kronos
WHITE PAPER: Read this white paper to learn what you need to know about the labor laws in certain areas, how you can ensure your operation is following all labor law regulations, and how to make the right business decisions regarding your employees to ensure they're accurately paid.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

Kronos

Process Automation and Content Integration: Orion Registrar Case Study
sponsored by K2
CASE STUDY: In this case study, find out how Orion Registrar adopted a modern BPM platform in conjunction with SharePoint so that they could streamline auditing and certification processes, simplify reporting, increase compliance, and more.
Posted: 12 Mar 2018 | Published: 31 Dec 2017

K2

EU GDPR Compliance puts Focus on Data Tracking, Encryption
sponsored by The Media Trust
EGUIDE: GDPR compliance is mandatory by May 25, 2018. Discover how encryption will be an overlooked but key part in compliance, as well as how to reduce risk by avoiding keeping more personal data than is necessary for business/legal needs.
Posted: 26 Jun 2017 | Published: 22 Jun 2017

The Media Trust

How to Keep Cloud Services Compliant with HIPAA Standards
sponsored by Actiance
EGUIDE: In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Actiance

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
76 - 100 of 246 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement