Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed   
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software Reports
1 - 25 of 186 Matches Previous Page  |  Next Page
Avoid Getting More Than You Bargained for in M&A Deals
sponsored by Avalara
WHITE PAPER: Sales tax is a common challenge during mergers and acquisitions, but rarely gets addressed early on. However, syncing sales tax management early in the process can save you from serious compliance headaches later. In this white paper, learn how to include sales tax compliance in your integration strategy.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

Upgrading Your ERP?
sponsored by Avalara
WHITE PAPER: Upgrading an ERP platform and integrating it with a modern tax automation solution becomes more urgent as the definition of nexus expands beyond physical presence. This white paper will address the urgency of tax automation, the limitations of legacy and on-premise solutions, and the advantages of cloud-based platforms.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

5 Ways Growing Companies Get Tripped Up by Sales Tax
sponsored by Avalara
WHITE PAPER: In this white paper, find 5 activities that high growth companies undertake that can be a roadblock to sales tax compliance and how a tax automation software can help.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avalara

Business Expansion and Sales Tax Nexus
sponsored by Avalara
WHITE PAPER: Planting your company flag in fertile new ground is one way to expand your business. But it can also bring up a crop of new compliance issues. This white paper will help you prepare for dealing with new tax requirements that spring up from growth.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Avalara

Unified Data Protection for Hybrid IT: Part 1
sponsored by Forcepoint
WEBCAST: Enterprises are facing new challenges when it comes to protecting regulated data and critical IP. In this webinar, explore how companies should rethink data security by focusing on the 3 main principles including analytics-driven visibility, risk-adaptive controls and intelligence & dynamic automation.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Forcepoint

Modernizing Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property – all while adapting to evolving IT environments. In this webcast, Angelica Torres-Corral discusses how to gain visibility and control of your data, optimize a DLP solution, and more.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Forcepoint

Supporting NERC CIP Compliance
sponsored by Claroty
WHITE PAPER: Electric industry asset owners are subject to mandatory cybersecurity regulations known as the NERC CIP standards. In this white paper, learn how Claroty's fully integrated platform supports entities' compliance efforts while helping to improve the cybersecurity and operational reliability of power generation and transmission systems.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

Regulatory Updates Roundup Of 10 Recent FINRA And SEC Violations And Penalties
sponsored by Smarsh
WHITE PAPER: Over the past year, the SEC and FINRA have been enforcing communications supervision compliance regulations throughout the financial services industry. In this white paper, discover 10 of the most notable violations from Smarsh's monthly Regulatory Update blog posts to review how they occurred.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Smarsh

Identity and Access Management: Automated Peace of Mind
sponsored by Imprivata
RESOURCE: Inside, discover how your healthcare organization can benefit from an identity access management (IAM) solution purpose-built for healthcare, and learn how an IAM can help your organization ensure immediate access to vital patient care information, check test results from mobile, meet DEA requirements, and more.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Imprivata

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

On the Radar: IBM Resilient Applies Incident Response Orchestration to GDPR Data Breaches
sponsored by IBM
ANALYST REPORT: Download Ovum's On the Radar Report to learn how the IBM Resilient SOAR Platform simplifies breach notification by using built-in guidance and templates to track breach management and reporting tasks, privacy-focused assessment to help determine who to notify, and regularly updated breach notification requirements.
Posted: 20 Sep 2019 | Published: 24 Oct 2018

IBM

How Do You Cultivate Compliance to Protect Your Business?
sponsored by Concur Technologies
WHITE PAPER: Regardless of your organization's industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. In this white paper, uncover 6 ways to get control over compliance, effectively manage travel and expense spend, and cultivate a culture of compliance.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Concur Technologies

Australian Bureau of Statistics Achieves Compliance Rates of over 99%
sponsored by Concur Technologies
CASE STUDY: How did the Australian Bureau of Statistics (ABS) overcome the problems posed by their multiple disparate systems to achieve compliance rates of over 99%? View this case study to find out more, and learn about Concur's role in their transformation.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Concur Technologies

Global Guide to Electronic Signature Law
sponsored by Adobe Systems Incorporated
EBOOK: In this global guide to electronic signature law, discover how over 45 countries around the globe view the legality and admissibility of e-signatures. Explore the summaries of electronic signature law from all the largest global economies, and review what approach to e-signatures your organization should take in order to maintain compliance.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Adobe Systems Incorporated

E-Signature Solution for Global Businesses
sponsored by Adobe Systems Incorporated
EBOOK: In this e-book, explore the benefits and challenges of electronic and digital signatures. Learn how organizations that employ e-signature technology can better conduct business at a global scale, and review your software options with Adobe Sign.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Adobe Systems Incorporated

Streamline Compliance & Automate Audit Efforts
sponsored by Onapsis
DATA SHEET: Learn how Onapsis allows you to deliver actionable risk intelligence, continuous threat monitoring, and automated policy and risk governance.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Onapsis

Top 10 Reasons Customers Choose Proofpoint to Protect Office365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

Case Study: Schiavello Improves Document Management & Compliance
sponsored by M-Files
CASE STUDY: Dive into this case study to discover how Schiavello uses M-Files to manage compliance more effectively.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

M-Files

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

What is HIPAA Compliance And Why Your HDO Business Should Care
sponsored by Crowd Machine
RESOURCE: Read this white paper to learn how CIOs can engage and protect the broad health ecosystem in a way that complies with the demands of HIPAA, while still maintaining efficient data accessibility.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Crowd Machine

Key Considerations for Compliance in the Cloud
sponsored by Virtru
RESOURCE: Data is the mission-critical information that keeps your business running. So it should come as no surprise that organizations are regularly targeted by cybercriminals in an effort to steal data. In this infographic, learn how Virtu's encryption and access management solution ensures data security in the cloud, and facilitates compliance in 4 ways.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru
1 - 25 of 186 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement