Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Management Software

RSS Feed   
Compliance Management Software Reports
 
Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

Identity and Access Management: Automated Peace of Mind
sponsored by Imprivata
RESOURCE: Inside, discover how your healthcare organization can benefit from an identity access management (IAM) solution purpose-built for healthcare, and learn how an IAM can help your organization ensure immediate access to vital patient care information, check test results from mobile, meet DEA requirements, and more.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
sponsored by Rapid7
WHITE PAPER: The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Rapid7

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

Upgrading Your ERP?
sponsored by Avalara
WHITE PAPER: Upgrading an ERP platform and integrating it with a modern tax automation solution becomes more urgent as the definition of nexus expands beyond physical presence. This white paper will address the urgency of tax automation, the limitations of legacy and on-premise solutions, and the advantages of cloud-based platforms.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

Seamless Transition to CUI Markings
sponsored by TITUS
PRODUCT OVERVIEW: While it is critical to set standardized controls for the way information is handled, the process of implementing CUI markings is complex, time-consuming, and sometimes unclear. In this solution brief, learn how Titus data protection solutions can help organizations to ensure they meet CUI requirements.
Posted: 02 Aug 2019 | Published: 30 Jun 2019

TITUS

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

GDPR Data Protection Edicts Make Good Data Governance a Must
sponsored by SearchDataManagement
EBOOK: Without the necessary governance controls, as mandated by GDPR, data can be a source of risk rather than value. Read this e-guide for advice on how to make the best out of compliance standards and protect your company from liability.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

SearchDataManagement

Pulse E-zine: Vol. 3, No. 2
sponsored by SearchHealthIT.com
EZINE: While the health IT spotlight shifts to the release of stage 3 meaningful use guidelines, many providers are still struggling with stage 2 reporting. In this issue of Pulse, learn what's next for meaningful use, how it has affected EHRs, and how to align an analytics plan with the needs of your organization.
Posted: 23 Mar 2015 | Published: 19 Mar 2015

SearchHealthIT.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement