Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Management Software

RSS Feed   
Compliance Management Software Reports
 
Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Mercury Processing Services International Secures Growth
sponsored by Comforte AG
CASE STUDY: Mercury Processing Services needed a solution that would properly protect all types of data not just for the sake of compliance, but also so that they would have another layer of protection from potential hackers. In this case study, learn about Mercury's experience using comforte's SecurDPS to protect their data.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Comforte AG

GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Sydney Opera House Case Study
sponsored by Blackberry Cylance
CASE STUDY: The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Blackberry Cylance

Getting Started with eLearning: Eight Questions to Consider
sponsored by SumTotal
WHITE PAPER: What are the benefits of e-learning, and how can you get started? In this white paper, uncover 8 questions you should be asking to develop your learning strategy, and discover how to choose the best e-learning platform for your organization.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

SumTotal

Australian Bureau of Statistics Achieves Compliance Rates of over 99%
sponsored by Concur Technologies
CASE STUDY: How did the Australian Bureau of Statistics (ABS) overcome the problems posed by their multiple disparate systems to achieve compliance rates of over 99%? View this case study to find out more, and learn about Concur's role in their transformation.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Concur Technologies

Technology Tools and Policies for Corporate Compliance
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance e-book, examine the technology tools and policies organizations are implementing as part of a wide-ranging corporate compliance program.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchCompliance.com

Top 3 Cloud Security Developments
sponsored by SearchCloudSecurity.com
EBOOK: This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.
Posted: 09 Feb 2016 | Published: 29 Apr 2016

SearchCloudSecurity.com

PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

DellEMC and Intel®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info