Software  >   Applications Software  >   Enterprise Applications Software  >  

Compliance Software

RSS Feed   
ALSO CALLED: Regulatory Compliance Software, Compliance Management Software, Financial Compliance Software, Security Compliance Software
DEFINITION: Software that performs compliance recordkeeping and reporting.
Compliance Software Reports
51 - 75 of 183 Matches Previous Page  |  Next Page
The Choice is Yours: Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance
sponsored by Comforte AG
WHITE PAPER: In this white paper, learn how by adopting a truly effective data security strategy, organizations can avoid damage and establish a rock-solid foundation for cybersecurity best practices that supports the organization's business objectives in all areas.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Comforte AG

Mercury Processing Services International Secures Growth
sponsored by Comforte AG
CASE STUDY: Mercury Processing Services needed a solution that would properly protect all types of data not just for the sake of compliance, but also so that they would have another layer of protection from potential hackers. In this case study, learn about Mercury's experience using comforte's SecurDPS to protect their data.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

Comforte AG

How Can Time Clocks Drive Strategy? Insights into Controllable Costs
sponsored by Kronos
WEBCAST: Download this webinar to listen as as John Frehse of Ankura Consulting Group and Toni Coon of Kronos discuss time theft, employees gaming the system, and how incremental minutes accumulated on a daily basis can add up and incur unnecessary overtime hours and pay.
Posted: 25 Mar 2019 | Premiered: Mar 25, 2019

Kronos

Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017

Trend Micro, Inc.

6 Elements of Effective Compliance Training: What Moves the Needle
sponsored by Skillsoft
WHITE PAPER: The task of understanding what makes a compliance training program effective may seem daunting. However, the foundation of any effective compliance training program begins with 6 essential elements. This white paper outlines these 6 components and explores how each one contributes to organizational strategy and efficacy.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Skillsoft

Ridding Toxins from Corporate Culture
sponsored by Skillsoft
EBOOK: Compliance training is a necessity to reduce the liability and legal risks businesses face. In this eBook, learn about Skillsoft's Compliance Maturity Model which helps organizations identify the right learning content and approaches that will focus on behavior and culture to reap the full business benefits of investments in compliance programs.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Skillsoft

Getting Started with eLearning: Eight Questions to Consider
sponsored by Skillsoft
WHITE PAPER: What are the benefits of e-learning, and how can you get started? In this white paper, uncover 8 questions you should be asking to develop your learning strategy, and discover how to choose the best e-learning platform for your organization.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

Skillsoft

8 Reasons Why SIEM Users Are Making the Switch to LogRhythm
sponsored by LogRhythm, Inc.
PRODUCT REVIEW: In this resource, discover 8 reasons why LogRhythm customers made the switch from SIEMs. The top reasons include stopping the bad guys, saving time and resource drain, having a better user interface and more.
Posted: 22 Jan 2019 | Published: 22 Jan 2019

LogRhythm, Inc.

Public Records Modernization: Your Key to Compliance
sponsored by Smarsh
EGUIDE: Ensuring your recordkeeping efforts are cutting edge is your best strategy for avoiding fines and litigation resulting from public records gaps. In this crash-course guide, explore how modernizing your public recordkeeping solutions can help protect your organization from costly fines and bridge critical data gaps.
Posted: 20 Dec 2018 | Published: 19 Dec 2018

Smarsh

Data Protection Ascends the Business Agenda
sponsored by ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

ComputerWeekly.com

Is Your Old-Fashioned Information Management Strategy Holding You Back?
sponsored by Mimecast
WEBCAST: Why are businesses abandoning their legacy information management strategies? In this webinar, CEO of Contoural, Mark Diamond, addresses how the information landscape has changed with evolving record-keeping requirements. Find out what you can do to plunge ahead if your business is being held back by archaic information management strategies.
Posted: 13 Dec 2018 | Premiered: Dec 13, 2018

Mimecast

Strengthen E-Discovery Readiness to Reduce Cost and Risk
sponsored by Mimecast
NEWSLETTER: Enterprises are caught in the trap of constantly reacting to governance events, resulting in costly outsourcing and frantic in-house burdens. Read on to view the possible benefits of employing an e-discovery readiness plan, and explore how cloud archives can reduce the burden of responding to compliance investigations and governance events.
Posted: 12 Dec 2018 | Published: 30 Apr 2018

Mimecast

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Bay Federal Credit Union: How SOC-as-a-Service Has Helped Add Business Value
sponsored by Arctic Wolf
CASE STUDY: In this case study, Bay Federal Credit Union switched from using a managed security service provider (MSSP) to a SOC-as-a-Service. When looking for someone to monitor their systems, they looked at various MDR alternatives before deciding to use AWN CyberSOC Services. The credit union saw exceptional results in a short amount of time.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

If That Data Deal Seems Too Good to Be True, It Probably Is
sponsored by TechTarget
WHITE PAPER: In an environment where GDPR is raising good questions about data quality, this white paper discusses key issues and guidance for marketers—whether the data is sourced for simple appending and other hygiene or as a catalyst for delivering significant business performance gains.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

TechTarget

CyberGRX Risk Assessment Methodology
sponsored by CyberGRX
WHITE PAPER: CyberGRX assessments apply a dynamic and comprehensive approach to risk management. They aim to provide an in-depth view of how a vendor's security controls will protect against potential threats. Download this resource to learn how you can have an up to date view of your third-party portfolio, and spend less time filling in redundant spreadsheets.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

CyberGRX

ServiceNow Vendor Risk Management
sponsored by ServiceNow
WHITE PAPER: Download this white paper to learn about ServiceNow's Vendor Risk Management tool, which provides a means to facilitate stakeholder interactions, drive transparency and accountability, and effectively monitor vendor-related risks.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

ServiceNow

Guide to Compliant Archiving: Have Your Cake and Eat It Too in a Post-Email World
sponsored by Smarsh
WHITE PAPER: Despite the increased scope of data organizations need to capture and archive, new tools have simultaneously emerged to simplify and automate this process. Downloading this guide will assist you in achieving and maintaining compliance without impacting users' overall productivity.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Smarsh

ServiceNow Indicator Based Continuous Control Management
sponsored by ServiceNow
WHITE PAPER: Find out how Indicator-Based Continuous Control Management can benefit your compliance processes.
Posted: 05 Oct 2018 | Published: 31 May 2018

ServiceNow

Compliance Matters: How New Laws Are Affecting Your Bottom Line
sponsored by Kronos
VIDEO: Due to a lack of federal guidance, many state legislatures have taken it upon themselves to enact state laws to support labor initiatives. Watch this webcast to learn about current rules and regulations and how they're affecting businesses, and explore an HR platform that can help you maintain compliance.
Posted: 04 Oct 2018 | Premiered: 28 Sep 2018

Kronos

State Compliance Guide: Navigating State and Local Labor Regulations
sponsored by Kronos
WHITE PAPER: Read this white paper to learn what you need to know about the labor laws in certain areas, how you can ensure your operation is following all labor law regulations, and how to make the right business decisions regarding your employees to ensure they're accurately paid.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

Kronos

Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day
sponsored by Smarsh
RESOURCE: Learn how you can handle operational, market, compliance and reputation concerns, and why it is important to get a good handle on your company's electronic communications data.
Posted: 09 May 2018 | Published: 09 May 2018

Smarsh

Facing up to emerging technology: Risks and benefits
sponsored by SearchCIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

SearchCIO

Managing Customer Data in the GDPR Era
sponsored by GearsDesign
EGUIDE: Download this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

GearsDesign
51 - 75 of 183 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement