Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Management Software

RSS Feed   
Compliance Management Software Reports
 
The Impact of ISO 26262 on Automotive Development
sponsored by Jama Software
WHITE PAPER: The functional safety standard, ISO 26262, has added more requirements to the product lifecycle for automotive hardware-software systems. This extensive guide examines the impact of this standard on both the development process and support tool chains for automotive electronics—and touches on some of the recent updates it has received.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

Jama Software

How to Comply with PCI-DSS 4.0
sponsored by ColorTokens
RESOURCE: PCI-DSS 4.0 is expected to roll out mid-2021, and organizations are preparing their compliance strategies to reflect the expected adjustments. This article provides an overview of what will change in PCI-DSS 4.0, what will carry over, and how to pick a technology partner to help achieve compliance.
Posted: 05 Oct 2020 | Published: 05 Jun 2020

ColorTokens

Classification by Design: The Foundation of Effective Data Protection Compliance
sponsored by HelpSystems
WHITE PAPER: According to Forrester, a significant proportion of security decision makers have not invested in data discovery and classification. This is likely due to the growing complexity within compliance. This white paper may help you make sense of the chaos by outlining why regulatory data compliance is growing harder to achieve.
Posted: 01 Dec 2020 | Published: 30 Oct 2020

HelpSystems

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

VMware Carbon Black Cloud Audit and Remediation
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Cloud Audit and Remediation, designed to deliver real-time assessment and remediation for faster, easier access to audit and reconfigure endpoints across their organization.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

The Business of Data Security
sponsored by Citrix
EBOOK: As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

Application Control and Critical Infrastructure Protection
sponsored by VMware International Unlimited Company
DATA SHEET: Reducing unscheduled downtime of critical systems as a result of a cyberattacks should be at the top of every organization’s security to-do list for this year. VMware Carbon Black wants to help. Read this data sheet to learn about their App Control offering, designed to eliminate unplanned downtime and protect critical systems at scale.
Posted: 18 May 2020 | Published: 27 Jan 2020

VMware International Unlimited Company

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info