Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed   
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software Reports
1 - 25 of 179 Matches Previous Page  |  Next Page
6 Critical Reasons for Office 365 Backup
sponsored by Veeam Software
WHITE PAPER: Access this white paper to learn the 6 reasons why backing up Office 365 is critical so you can close security gaps before your data is compromised.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Veeam Software

The Total Economic Impact of Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.
Posted: 23 Oct 2020 | Published: 31 Aug 2020

Armor

Data Storage for Every Data Tier
sponsored by Iron Mountain
DATA SHEET: Access this data sheet to learn how Iron Mountain’s Data Management Service Portfolio lets you do things like easily move inactive cloud data to tape, decrease your storage costs and ensure long-term archival data compliance.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Iron Mountain

IT-GRC Tools
sponsored by ServiceNow
WHITE PAPER: IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.
Posted: 12 Oct 2020 | Published: 21 Jul 2020

ServiceNow

How to Comply with PCI-DSS 4.0
sponsored by ColorTokens
RESOURCE: PCI-DSS 4.0 is expected to roll out mid-2021, and organizations are preparing their compliance strategies to reflect the expected adjustments. This article provides an overview of what will change in PCI-DSS 4.0, what will carry over, and how to pick a technology partner to help achieve compliance.
Posted: 05 Oct 2020 | Published: 05 Jun 2020

ColorTokens

Cloud Data Storage: The Promise and The Challenges
sponsored by NetApp
EBOOK: Access this e-book from NetApp to analyze the 14 challenges your organization should be prepared to face while migrating to the cloud, how to address them, and why Cloud Volumes ONTAP can help you at every step along the way.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

NetApp

Manage Security Risk with Red Hat Insights
sponsored by Red Hat
WHITE PAPER: Access this white paper to learn about Red Hat Enterprise Linux, a tool that offers 5 key benefits for organizations looking to analyze, prioritize, and remediate issues as well as report their status.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Red Hat

The Risk Cloud
sponsored by LogicGate
WHITE PAPER: Approaches to risk management are shifting from reactive to proactive. Integrating risk management programs is a key to growth in today’s digital landscape. Many of the challenges involving risk, including lack of visibility and poor UX, can be solved through a more agile approach. Read this white paper to learn about the Risk Cloud and agile GRC.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

LogicGate

Armor Secure Hosting Proactive Security for Payment Transactions and PCI Data
sponsored by Armor
DATA SHEET: Businesses requiring PCI compliance are in between a rock and a hard place when it comes to continuity. They need to be able to scale, but various security vulnerabilities introduce themselves through the process. Now, you can be both secure and compliant. Scan this data sheet on Armor Secure Hosting to learn how to proactively secure payments.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Armor

Security and Compliance for a Case Management SaaS
sponsored by Armor
CASE STUDY: When a private case management platform evolved into a software-as-a-service (SaaS) offering, a healthcare tech company needed a secure cloud-based solution that could help ensure HIPAA compliance. Read this comprehensive case study to learn about Armor Anywhere, a secure hosting platform designed with security and compliance in mind.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Armor

Overhauling Endpoint Protection Aids Innovation and Strengthens Security Posture
sponsored by McAfee, Inc.
CASE STUDY: In this case study, follow the journey of Sutherland Global Services, a business process transformation provider with a growing number of global endpoints, as they partner with McAfee in order to provide 24/7 availability to their workforce, unify security processes and address compliance requirements.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

McAfee, Inc.

Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

Qorus Software Uses Hyperproof to Gain Control Over Its Compliance Program
sponsored by Hyperproof
CASE STUDY: In this case study, follow Qorus, a sales enablement and proposal management provider, as they partner with Hyperproof to address security and compliance issues and achieve flexibility that scales as the organization grows.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Hyperproof

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

Public Cloud Adoption in Financial Services- 7 key considerations for CIOs (Celent paper)
sponsored by IBM
WHITE PAPER: Access this white paper for 7 critical considerations as financial institutions plan and execute their technology transformation and public cloud migration strategies.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

IBM

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

Egress Prevent
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: An emerging practice in today’s email security strategies is the implementation of preventative measures to stop data breaches before they happen – regardless if they’re accidental or intentional. This solution brief explores the key features and capabilities of Egress Prevent, which uses machine learning to secure email inboxes and users.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Egress Software Technologies Inc

Data Protection Compliance in the UK
sponsored by Zivver
EBOOK: GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Zivver

Tax Automation reduces costs and meets security and compliance requirements
sponsored by Pulsant
CASE STUDY: In this case study, follow Tax Automation, a tax software company based in the UK, as they partner with Pulsant to streamline the delivery and accessibility of their offerings through a transition towards a SaaS model. Read on to discover the Tax Automation’s challenges, required capabilities and results.
Posted: 20 Aug 2020 | Published: 20 Aug 2020


It’s All About the Data
sponsored by Tala Security
WHITE PAPER: Online retailers are quickly realizing that enhanced user experience often comes at the cost of security – but that doesn’t necessarily need to be the case. In this blog post, take a closer look at the challenges, risks and opportunities as they related to data privacy and security.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

Predictive Identity: A Key Enabler for a Successful Merger or Acquisition
sponsored by SailPoint Technologies
EBOOK: This e-book details how a predictive identity solution can be used by organizations to effectively manage user access to applications, data, and cloud infrastructures in a compliant and secure manner before, during and after a merger or acquisition.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

SailPoint Technologies

Discover the Governance and Compliance Features of Microsoft Teams
sponsored by Insight
WEBCAST: In this webcast, the speaker dives into the significance of planning for governance, maintaining compliance, and lays out how Insight can help. Access it here.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020

Insight

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales
1 - 25 of 179 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info