Compliance reporting software

RSS Feed   
Compliance reporting software Reports
1 - 25 of 64 Matches Previous Page  |  Next Page
Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

Qorus Software Uses Hyperproof to Gain Control Over Its Compliance Program
sponsored by Hyperproof
CASE STUDY: In this case study, follow Qorus, a sales enablement and proposal management provider, as they partner with Hyperproof to address security and compliance issues and achieve flexibility that scales as the organization grows.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Hyperproof

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

Egress Prevent
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: An emerging practice in today’s email security strategies is the implementation of preventative measures to stop data breaches before they happen – regardless if they’re accidental or intentional. This solution brief explores the key features and capabilities of Egress Prevent, which uses machine learning to secure email inboxes and users.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Egress Software Technologies Inc

Data Protection Compliance in the UK
sponsored by Zivver
EBOOK: GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Zivver

Tax Automation reduces costs and meets security and compliance requirements
sponsored by Pulsant
CASE STUDY: In this case study, follow Tax Automation, a tax software company based in the UK, as they partner with Pulsant to streamline the delivery and accessibility of their offerings through a transition towards a SaaS model. Read on to discover the Tax Automation’s challenges, required capabilities and results.
Posted: 20 Aug 2020 | Published: 20 Aug 2020


Discover the Governance and Compliance Features of Microsoft Teams
sponsored by Insight
WEBCAST: In this webcast, the speaker dives into the significance of planning for governance, maintaining compliance, and lays out how Insight can help. Access it here.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020

Insight

GDPR, CCPA, & Beyond
sponsored by Talend
WHITE PAPER: Access this white paper to learn about the data sovereignty regulations that dictate data privacy across the globe including GDPR and CCPA and discover 16 steps to enact a data governance program for data privacy with Talend.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Talend

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

Avoiding Data Leaks with Scalable Encryption and Access Controls
sponsored by Thales
PRODUCT OVERVIEW: Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Thales

The Business of Data Security: 4 Often Overlooked Security Considerations for SMBs
sponsored by Citrix
EBOOK: As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

Where Law and Tech Will Collide in 2020
sponsored by RSA Conference
WEBCAST: The acceleration of “tech disruption” across all industries is exacerbating privacy risks to consumers globally. NIST has released draft privacy controls, providing guidance for companies to manage privacy risks. Watch this RSA Conference webinar to see industry experts discuss where technology and the law might find friction in 2020.
Posted: 09 Jul 2020 | Premiered: Jan 7, 2020

RSA Conference

Cloud Migration Challenges
sponsored by BigID
PRODUCT OVERVIEW: Cloud migrations are nearing the point of necessity – even for highly regulated and risk-averse organizations. So, how can these organizations minimize risk, ensure data privacy and avoid costly disruptions? Read on to learn more about the challenges of cloud migration and how BigID is helping organizations overcome these obstacles.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

BigID

Understanding the Complexities of Digital OT Security
sponsored by Fortinet, Inc.
WHITE PAPER: To address growing vulnerabilities within their infrastructure, organizations often look to incorporate various point security tools to cover each new risk. However, this approach creates additional complexities and introduces a myriad of new security challenges. So, what’s the best path towards simplified cybersecurity? Read on to find out.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Fortinet, Inc.

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: In order to help organizations enable their software developers to identify, remediate and prevent vulnerabilities, Veracode Security Labs provides comprehensive training for the most relevant application security topics of today. Read on to learn more about the program.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

Modernize Your Approach to Compliance and Security
sponsored by Rackspace
RESOURCE: IT security and compliance are critical aspects for protecting today’s business environments. However, the global shortage of security professionals can make acquiring in-house cybersecurity expertise difficult. The following article provides expert guidance for overcoming today’s security and compliance challenges.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Rackspace

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

VMware Carbon Black Cloud Audit and Remediation
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Cloud Audit and Remediation, designed to deliver real-time assessment and remediation for faster, easier access to audit and reconfigure endpoints across their organization.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020

Contrast Security

Reclaim Your Compliance Training
sponsored by Cornerstone OnDemand
WHITE PAPER: Download this white paper to learn how you can reclaim compliance training and move past negative connotations to get more value out of it.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Cornerstone OnDemand

The 4 Levels of Automated Remediation
sponsored by DivvyCloud
WHITE PAPER: Automated remediation allows for organizations to save time and resources by automating security tasks that previously required manual attention. Contrary to popular belief, organizations don’t need to be at 100% automation on day 1. In this guide, discover the various levels of automation and learn how to choose the right one for you.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

DivvyCloud

Cloudian HyperStore Compliance Assessment
sponsored by Cloudian
EBOOK: In this e-book, Cohasset Associates has been called upon to assess the capabilities of Cloudian HyperStore. Read on to learn Cohasset’s opinion on HyperStore which includes whether or not it retains records requiring time-based retention in compliance with the recording and non-rewritable, non-erasable storage of electronic records.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Cloudian

Governance, Risk, and Compliance: Use Case Guide
sponsored by ServiceNow
WHITE PAPER: Tap into this guide to see how an integrated risk program on a common platform can help continuously monitor for risk and compliance across the extended enterprise, holistically prioritize risk based on business impact to improve decision making, and much more.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

ServiceNow
1 - 25 of 64 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info