Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed   
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software Reports
1 - 25 of 175 Matches Previous Page  |  Next Page
Virtualization-Based Security - External Key Management
sponsored by Thales
WHITE PAPER: Thales Trusted Cyber Technologies (TCT) is a U.S. based provider of government high-assurance data security solutions. Their mission is to provide innovative solutions to protect the most vital data from the core to the cloud to the field. Scan this white paper to get a closer look at TCT and their enterprise cryptographic key manager.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Thales

Security and Compliance Automation for Financial Services
sponsored by Red Hat and Intel
WHITE PAPER: A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Red Hat and Intel

ClearedIn for Microsoft Teams: Cloud Collaboration Security & Compliance
sponsored by Clearedin
DATA SHEET: Organizations are moving to Microsoft Teams to foster stronger collaboration, faster and more efficient communications and more meaningful connections with customers and partners. But security and compliance are two important concerns. Browse this data sheet to see how you get a powerful security and compliance layer for Teams.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Clearedin

A Smarter Way for Email Security + Cloud Collaboration Compliance
sponsored by Clearedin
DATA SHEET: Today’s volatile security ecosystem has left organizations scrambling to compliantly secure their email servers. And with the cloud seeing so much use, it can be difficult to know which software will keep you out of the woods. In this solution brief, you can explore how Clearedin is helping businesses to compliantly collaborate in the cloud.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Clearedin

3 Top Ways to Improve Data Protection and Governance for Secure Remote Work
sponsored by Microsoft
RESOURCE: If you’re using Microsoft products such as Outlook or Teams, don’t you want to make sure that the data going through them is protected, compliant and governed? Well you’re in luck – Microsoft has released specific integrations designed to make these processes simpler. Download this article to see 3 key ways these solutions meet the challenge.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

Microsoft

8 Do's and Don'ts for Writing Requirements
sponsored by Jama Software
WHITE PAPER: Every word matters when authoring requirements. According to Jama Software, something as simple as adding an adverb or using “should” instead of “must” can create ambiguity that confuses engineers and sets a project back. Check out the 8 Do’s and Don’ts for Writing Requirements here to keep the product development lifecycle on schedule.
Posted: 16 Dec 2020 | Published: 16 Dec 2020

Jama Software

The Impact of ISO 26262 on Automotive Development
sponsored by Jama Software
WHITE PAPER: The functional safety standard, ISO 26262, has added more requirements to the product lifecycle for automotive hardware-software systems. This extensive guide examines the impact of this standard on both the development process and support tool chains for automotive electronics—and touches on some of the recent updates it has received.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

Jama Software

Continuous Compliance on AWS
sponsored by AWS Mphasis/Stelligent
WEBCAST: Most of the typical activities involved in compliance are nothing more than ‘risk management theater’: a mere spectacle that has very little to do with assessing or reducing actual risk. What if there was a way AWS users could assess, audit and evaluate the configurations of their AWS resources on a continuous basis? This webcast explains how.
Posted: 11 Dec 2020 | Premiered: Oct 28, 2020

AWS Mphasis/Stelligent

Simplifying Cross-Framework Compliance Management
sponsored by Aptible
WEBCAST: Compliance professionals dread audits. With all of the standards and regulations organizations are held to, finding apt software to maintain compliance across multiple frameworks is an arduous process – until now. Check out this webcast from Aptible to get a look at how you can use automation to remove stress from audits.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

Aptible

How Automation Helps You Harden Your Systems And Become Compliant
sponsored by Puppet
WHITE PAPER: IT automation can help IT operations teams proactively handle compliance-related work. Open this white paper to learn more about the critical role of IT automation for meeting security requirements in your organization. Plus, tips on how to approach IT automation solutions.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Puppet

Comforte SecurDPS: Enterprise Solution for GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

The Maturity Model for Governance, Risk, and Compliance
sponsored by Aptible
EBOOK: For more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

How to Level Up Your Access Control
sponsored by Aptible
EBOOK: As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY: A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020

Atakama

Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Gett Gains Competitive Edge
sponsored by Panorays
CASE STUDY: Gett, a European on-demand car service, was looking for a better way to manage their third-party security. Currently, their vendors underwent a lengthy vetting process to check that their security posture was strong. However, Gett wanted to streamline this process. In this case study, learn how they was able to do this with the help of Panorays.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Panorays

Taking Your Third Party Security Program to the Next Level
sponsored by Panorays
WEBCAST: Today, every organization’s attack surface is growing. It is growing for several reasons, including because organizations are outsourcing large portions of their IT systems to cloud providers, thereby adding their “bubble” to your own. In this webcast, learn how you can upgrade your third-party security program.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

Panorays

How a Regional US Bank Met the Needs of Regulatory Examiners
sponsored by Atakama
CASE STUDY: A large regional US-based commercial bank was written up for several security deficiencies in a prior audit. In response, this bank wanted to deploy meaningful security solutions that went beyond the minimum expectations of regulatory examiners. View this case study to learn how Atakama helped this bank become compliant through encryption.
Posted: 03 Dec 2020 | Published: 30 Sep 2020

Atakama

Sensitive Data Everywhere: Find It, Classify It, Manage It, and Protect It
sponsored by Fasoo
WHITE PAPER: Data naturally proliferates within an organization, and as most of this created data is now unstructured, it’s no longer effective to only apply controls to traditional databases and apps. In this impact brief, get a glimpse of some of the available solutions for securing unstructured data.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Fasoo

Classification by Design: The Foundation of Effective Data Protection Compliance
sponsored by HelpSystems
WHITE PAPER: According to Forrester, a significant proportion of security decision makers have not invested in data discovery and classification. This is likely due to the growing complexity within compliance. This white paper may help you make sense of the chaos by outlining why regulatory data compliance is growing harder to achieve.
Posted: 01 Dec 2020 | Published: 30 Oct 2020

HelpSystems

Improve Employee Privacy & Organizational Security
sponsored by Dtex
WHITE PAPER: Enterprise security systems often collect more data than they need to – this creates unnecessary privacy issues and raises costs associated with excess data storage and processing. So how can enterprises mitigate these issues while still improving security? In this solution brief, learn how to collect only the data you need.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Dtex

Data Discovery and Classification: The Foundation of Effective Information Governance
sponsored by HelpSystems
WHITE PAPER: With the right technology tools, a data discovery and classification exercise will enable an enterprise to find its sensitive data, label it with the appropriate sensitivity and ensure that you can demonstrate regulatory compliance. View this white paper to learn why organizations should take a joint approach to tackling big data.
Posted: 24 Nov 2020 | Published: 30 Oct 2020

HelpSystems

Access & Protect your Data – Anywhere, Anytime
sponsored by HelpSystems
DATA SHEET: In this brief, learn how Titus and Dataguise can help bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable and vulnerable data wherever it resides.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

HelpSystems

How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation
sponsored by WhiteHat Security
CASE STUDY: A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

WhiteHat Security

The Evolution of Evidence Collection
sponsored by Aptible
EBOOK: Evidence collection is mundane & exhausting, and what’s worse is that it can happen once a quarter or more. But despite its time-consuming nature, evidence collection is critical to passing an audit & proving compliance. By reading this guide, you can learn how to leverage automation to make evidence collection a bit less painful.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

Aptible
1 - 25 of 175 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info