Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed   
Compliance Best Practices Reports
1 - 25 of 506 Matches Previous Page  |  Next Page
California Consumer Privacy Act (CCPA) Compliance
sponsored by Socure
DATA SHEET: While the CCPA aims to protect and empower consumers, it also has the potential to expose businesses (and their customers) to breaches and other kinds of misuse of personal information. Read this data sheet to learn more about the risks related to CCPA and how to protect against them.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Socure

A Next-Generation Approach to KYC
sponsored by Socure
WHITE PAPER: While KYC has become an essential practice in the fight against financial crime, programs can often be burdensome and resource intensive. This whitepaper highlights 3 essential elements required for a safe, seamless and successful KYC program – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

Socure ID + Intelligent KYC
sponsored by Socure
DATA SHEET: Socure ID + KYC – also known as ‘Intelligent KYC’, is highly regarded for enabling organizations to unlock massive scale in auto-acceptance and enrollment rates. But how does it stack up against the competition? Read this data sheet to find out.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Socure

Microsoft Cloud Accelerator Workshop
sponsored by Insight
VIDEO: In order to realize the full benefits of Microsoft 365, Microsoft offers a number of workshops designed to be a deep dive into a specific functionality or capability. Watch this short video for an overview of what’s covered in the cloud, remote work, compliance and security workshops.
Posted: 08 Jan 2021 | Premiered: 08 Jan 2021

Insight

ClearedIn for Microsoft Teams: Cloud Collaboration Security & Compliance
sponsored by Clearedin
DATA SHEET: Organizations are moving to Microsoft Teams to foster stronger collaboration, faster and more efficient communications and more meaningful connections with customers and partners. But security and compliance are two important concerns. Browse this data sheet to see how you get a powerful security and compliance layer for Teams.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Clearedin

Evonik Industries Success Story
sponsored by SNP Transformation
CASE STUDY: For Evonik, a global chemicals company, balancing a growing list of compliance mandates with data protection and employee productivity is a difficult task. Read this case study to see why they partnered with SNP to address these challenges and discover the outcomes of this initiative.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

SNP Transformation

ClearedIn for Slack
sponsored by Clearedin
PRODUCT OVERVIEW: The shift towards remote work has led to a rise in the use of cloud collaboration tools, like Slack. This solution brief highlights how ClearedIn can enhance security and compliance capabilities to keep your Slack users safe and productive – read on to get started.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

Simplify Cloud Compliance For Banking & Financial Services
sponsored by WinMagic
CASE STUDY: Banks and financial services institutions are embracing cloud computing – but as industry-specific compliance grows increasingly complex, it becomes critical to ensure they meet data privacy and cloud compliance needs. Read this use case to learn how WinMagic is helping banks address cloud risks and compliance gaps.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

WinMagic

The New Workplace: Modernizing Security, Compliance and Remote Work
sponsored by Microsoft
RESOURCE CENTER: Today, nothing is more important than empowering your remote workforce with modern, integrated, resilient, cloud-enabled security and compliance protections. Check out this information hub to help you address your most pressing workplace challenges today.
Posted: 28 Dec 2020 | Published: 28 Dec 2020

Microsoft

5 Key Steps to Securely Connect your Remote Workforce
sponsored by Intrado
WHITE PAPER: The overnight shift from on-site to remote work environments has led to a mass adoption of video collaboration tools and applications. However, many companies took a “connectivity first” approach, exposing their organization to a host of new security risks. Stay safe – read these 5 steps to securely connecting your remote workforce.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

Intrado

3 Top Ways to Improve Data Protection and Governance for Secure Remote Work
sponsored by Microsoft
RESOURCE: If you’re using Microsoft products such as Outlook or Teams, don’t you want to make sure that the data going through them is protected, compliant and governed? Well you’re in luck – Microsoft has released specific integrations designed to make these processes simpler. Download this article to see 3 key ways these solutions meet the challenge.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

Microsoft

Reducing Security Risk in the Financial Services Industry
sponsored by AWS Rapid7
WHITE PAPER: A report from the Department of Digital, Culture, Media and Sport revealed almost half of UK businesses (46%) have had cybersecurity breaches or attacks in the last 12 months. The financial services industry is a prime target for such attacks, but by absorbing this white paper, you can learn measures to take to reduce organizational risk.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

AWS Rapid7

Protect Your Data on the Way to the Cloud
sponsored by Atakama
RESOURCE: Las year, the New York Department of Financial Services (NY DFS) issued 23 NYCRR 500, adding yet another compliance requirement to the already heavily regulated financial industry. Read this article to learn more about NY DFS, who it affects and why it matters.
Posted: 14 Dec 2020 | Published: 19 Oct 2020

Atakama

Agentless EDR For Unmanaged Devices
sponsored by Armis
PRODUCT OVERVIEW: As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Armis

Continuous Compliance on AWS
sponsored by AWS Mphasis/Stelligent
WEBCAST: Most of the typical activities involved in compliance are nothing more than ‘risk management theater’: a mere spectacle that has very little to do with assessing or reducing actual risk. What if there was a way AWS users could assess, audit and evaluate the configurations of their AWS resources on a continuous basis? This webcast explains how.
Posted: 11 Dec 2020 | Premiered: Oct 28, 2020

AWS Mphasis/Stelligent

Simplifying Cross-Framework Compliance Management
sponsored by Aptible
WEBCAST: Compliance professionals dread audits. With all of the standards and regulations organizations are held to, finding apt software to maintain compliance across multiple frameworks is an arduous process – until now. Check out this webcast from Aptible to get a look at how you can use automation to remove stress from audits.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

Aptible

Smarter Data Protection with Machine Learning
sponsored by HelpSystems
WHITE PAPER: As data grows in its volume and value, organizations should ensure their data privacy capabilities are poised to address today’s cyberthreats and compliance requirements. Read this white paper and discover how machine learning and artificial intelligence can enhance data security programs.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

HelpSystems

Enhancing Security Automation
sponsored by HelpSystems
BROCHURE: As the volume of data grows, improving data security efforts becomes increasingly critical as well as more difficult. This brochure provides a closer look at how Titus is incorporating automation and artificial intelligence (AI) into data security efforts in order to manage increasing pressures.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

HelpSystems

The Maturity Model for Governance, Risk, and Compliance
sponsored by Aptible
EBOOK: For more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

SecurDPS Discover and Classify
sponsored by Comforte AG
PRODUCT OVERVIEW: Data is becoming a highly valuable resource. As such, organizations are taking meticulous precautions in order to safeguard their data against attacks. This solution brief introduces SecurDPS Discover and Classify, designed to automate data discovery and classification to enhance network and data usage visibility – read on to learn more.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Comforte AG

The CISO's Guide to Supplier CCPA Readiness
sponsored by Panorays
EGUIDE: The following e-guide, The CISO's Guide to Supplier CCPA Readiness, provides a closer look at the key considerations and challenges CISOs are facing as they look to ensure their relationships with suppliers, vendors and other third parties are CCPA compliant. Read on to uncover the FAQs, common challenges, and best practices.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Panorays

How to Level Up Your Access Control
sponsored by Aptible
EBOOK: As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

Can You Handle Your Data?
sponsored by HelpSystems
WHITE PAPER: As data security regulations grow stricter and cyberthreats become more complex, organizations need better information handling and data governance policies — which includes the right tools to help them implement their policies. Read this white paper to learn more about data handling in the era of privacy and compliance.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

HelpSystems

Seamless Transition to CUI Markings
sponsored by HelpSystems
PRODUCT OVERVIEW: The Controlled Unclassified Information (CUI) program was implemented to standardize how government agencies safeguard unclassified information – however the program can be complex and time-consuming. Read this solution brief to learn about how Titus is helping agencies reduce the time and stress of a CUI program.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

HelpSystems

Gett Gains Competitive Edge
sponsored by Panorays
CASE STUDY: Gett, a European on-demand car service, was looking for a better way to manage their third-party security. Currently, their vendors underwent a lengthy vetting process to check that their security posture was strong. However, Gett wanted to streamline this process. In this case study, learn how they was able to do this with the help of Panorays.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Panorays
1 - 25 of 506 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info