Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed   
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software Reports
1 - 25 of 175 Matches Previous Page  |  Next Page
Partners Healthcare Turns to ClearSky Data for an All-in-one Storage Solution
sponsored by ClearSky Data
CASE STUDY: Download this study to discover how you can benefit, just as Partners HealthCare, the largest healthcare system in Massachusetts, did from employing an all-in-one backup solution to establish compliant data encryption, improve audit logging, and expand storage capacity as needs grow.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

ClearSky Data

Miles & Stockbridge Simplify eDiscovery, Backup and DR
sponsored by ClearSky Data
CASE STUDY: With their NAS system struggling to keep up, Miles & Stockbridge sought out alternatives. Read their study to see how they're now able to simplify their eDiscovery processes, protect 170 VMs, and satisfy ISO certification requirements with a scalable backup and DR solution.
Posted: 17 Apr 2019 | Published: 31 Dec 2018

ClearSky Data

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by comForte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

comForte AG

Supporting Business Agility in a Connected World
sponsored by HID Global
WHITE PAPER: In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

HID Global

A Framework for Data Privacy Survival
sponsored by ASG Technologies Group Inc
WEBCAST: Protecting customer data has become increasing difficult due the cyberattack explosion, increasing hacker creativity and the growing amounts of data. In this webcast, listen as Ian Rowlands from ASG Technologies and Kevin Moos from Primitive Logic discuss an integrated framework for customer privacy.
Posted: 11 Apr 2019 | Premiered: Mar 31, 2019

ASG Technologies Group Inc

Building a Modern Information Governance Strategy
sponsored by Mimecast
WHITE PAPER: Many organizations are rethinking their information management programs. They are creating modern and easier-to-execute policies, developing comprehensive processes and deploying better technology, all of which drive compliance. In this white paper, learn how key security challenges can be addressed through a modern information governance strategy.
Posted: 11 Apr 2019 | Published: 28 Sep 2018

Mimecast

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

Tackle GDPR with a Powerful Compliance Process
sponsored by ASG Technologies Group Inc
WHITE PAPER: The key areas of GDPR will require your company to utilize data solutions that can map, manage, and govern information. In this white paper, learn how implementing data protection at the base of your data management framework can help your organization always be ready for an audit.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

ASG Technologies Group Inc

How to Prepare for Orchestration & Automation
sponsored by D3 Security
WHITE PAPER: Sophisticated cyberattacks and a siloed IT ecosystem have promoted the rise of SOAR technology. Security teams must understand how to prepare for and deploy SOAR. In this white paper, explore 5 actions that you can take to prepare your SOC for SOAR.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

D3 Security

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

Orion Health Automates Security on AWS and Gains Centralized Management
sponsored by Trend Micro, Inc.
CASE STUDY: Orion Health embarked on a journey to build a SOC to support the deployment of Amadeus on AWS. They wanted everything on AWS to be automated. Having consistent, automated policies and processes would help to ensure that their customers' data was protected. In this case study, learn about Orion Health's experience using Trend Micro's Deep Security.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Trend Micro, Inc.

The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by comForte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

comForte AG

Mercury Processing Services International Secures Growth
sponsored by comForte AG
CASE STUDY: Mercury Processing Services needed a solution that would properly protect all types of data not just for the sake of compliance, but also so that they would have another layer of protection from potential hackers. In this case study, learn about Mercury's experience using comforte's SecurDPS to protect their data.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

comForte AG

Don't Let Security Concerns Stop You From Embracing Mobility
sponsored by Samsung Electronics
RESOURCE: How can organizations defend themselves against growing mobile security concerns? In this article, discover how to combat mobile threats, and explore how a three-pronged approach to mobile security can help your organization protect valuable company information and prevent phishing attacks.
Posted: 27 Mar 2019 | Published: 16 Nov 2018

Samsung Electronics

How Can Time Clocks Drive Strategy? Insights into Controllable Costs
sponsored by Kronos
WEBCAST: Download this webinar to listen as as John Frehse of Ankura Consulting Group and Toni Coon of Kronos discuss time theft, employees gaming the system, and how incremental minutes accumulated on a daily basis can add up and incur unnecessary overtime hours and pay.
Posted: 25 Mar 2019 | Premiered: Mar 25, 2019

Kronos

Facing up to emerging technology: Risks and benefits
sponsored by SearchCIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

SearchCIO

How Finance Leaders are Transforming Business Today
sponsored by SAP
RESOURCE: In this infographic, discover how successful CFO's drive higher business performance, and explore the technology you need to be counted among these financial leaders.
Posted: 21 Mar 2019 | Published: 31 Dec 2018

SAP

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by Forescout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Forescout

SAS Model Risk Management
sponsored by SAS
WHITE PAPER: The regulatory scrutiny being applied to model risk management is intensifying. As a result, banks need to maintain an inventory of models. In this white paper, learn how SAS Model Risk Management can help reduce the manual effort required to appropriately inventory, manage, document, communicate, monitor changes and audit firm-wide models.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

SAS

Forcepoint's CIO on GDPR Readiness: Get Stakeholders Aligned. Then Execute.
sponsored by Forcepoint
CASE STUDY: In this case study, learn how Forcepoint's leadership team needed to align on legal and security terminology in order to achieve GDPR compliance. Also, discover the steps that Forcepoint's CIO, Meerah Rajavel took to reach compliance.
Posted: 20 Mar 2019 | Published: 31 Dec 2018

Forcepoint

Fighting Financial Crime Amidst Growing Complexity
sponsored by SAS
WHITE PAPER: In this white paper, explore how AI is improving the effectiveness of anti-money laundering (AML) programs through the use of machine learning and robotic process automation (RPA). And learn how applying AI, RPA, and machine learning can improve your AML operations with workflow automation and increased monitoring.
Posted: 15 Mar 2019 | Published: 18 Apr 2018

SAS

GDPR is Just the Beginning for Data Science Programs
sponsored by Immuta, Inc
WHITE PAPER: Download this white paper to learn how you can make data protection a key design feature of your data operations, rather than an afterthought. Explore 7 legal trends as a framework to interpret and prioritize existing and new data regulations, helping you protect your customers' data.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

Immuta, Inc

Technology's Role in Data Protection - The Missing Link in GDPR Transformation
sponsored by Micro Focus & PwC
WHITE PAPER: The EU GDPR delivers a fundamental change in how data controllers and data processors handle personal data. In this white paper, evaluate your organization's GDPR efforts using PwC's framework for evaluating GDPR technology.
Posted: 11 Mar 2019 | Published: 31 Oct 2017

Micro Focus & PwC

State of Human Capital Management in Government Report 2019
sponsored by Cornerstone OnDemand
RESOURCE: 62% of government agencies are investing in digital transformation and new technology over the next 12 months, according to Cornerstone. To learn more about transforming your government workforce with human capital management, download this infographic, and explore how to harness the power of digital technologies for a successful 2019.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Cornerstone OnDemand
1 - 25 of 175 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement