Compliance reporting software

RSS Feed   
Compliance reporting software Reports
1 - 25 of 70 Matches Previous Page  |  Next Page
Implementing a Hybrid Cloud Using Security & Compliance Automation
sponsored by Red Hat
WEBCAST: Maintaining visibility, control and security while ensuring governance and compliance is paramount. This becomes more difficult and arduous in a hybrid infrastructure consisting of physical, virtual, cloud and container environments. Watch this webinar to see how Red Hat can help you with these challenges by automating security and compliance.
Posted: 22 Jan 2021 | Premiered: May 14, 2020

Red Hat

Continuous Compliance on AWS
sponsored by AWS Mphasis/Stelligent
WEBCAST: Most of the typical activities involved in compliance are nothing more than ‘risk management theater’: a mere spectacle that has very little to do with assessing or reducing actual risk. What if there was a way AWS users could assess, audit and evaluate the configurations of their AWS resources on a continuous basis? This webcast explains how.
Posted: 11 Dec 2020 | Premiered: Oct 28, 2020

AWS Mphasis/Stelligent

Simplifying Cross-Framework Compliance Management
sponsored by Aptible
WEBCAST: Compliance professionals dread audits. With all of the standards and regulations organizations are held to, finding apt software to maintain compliance across multiple frameworks is an arduous process – until now. Check out this webcast from Aptible to get a look at how you can use automation to remove stress from audits.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

Aptible

Comforte SecurDPS: Enterprise Solution for GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

The Maturity Model for Governance, Risk, and Compliance
sponsored by Aptible
EBOOK: For more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

How to Level Up Your Access Control
sponsored by Aptible
EBOOK: As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

Gett Gains Competitive Edge
sponsored by Panorays
CASE STUDY: Gett, a European on-demand car service, was looking for a better way to manage their third-party security. Currently, their vendors underwent a lengthy vetting process to check that their security posture was strong. However, Gett wanted to streamline this process. In this case study, learn how they was able to do this with the help of Panorays.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Panorays

Taking Your Third Party Security Program to the Next Level
sponsored by Panorays
WEBCAST: Today, every organization’s attack surface is growing. It is growing for several reasons, including because organizations are outsourcing large portions of their IT systems to cloud providers, thereby adding their “bubble” to your own. In this webcast, learn how you can upgrade your third-party security program.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

Panorays

Sensitive Data Everywhere: Find It, Classify It, Manage It, and Protect It
sponsored by Fasoo
WHITE PAPER: Data naturally proliferates within an organization, and as most of this created data is now unstructured, it’s no longer effective to only apply controls to traditional databases and apps. In this impact brief, get a glimpse of some of the available solutions for securing unstructured data.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Fasoo

Salesforce Government Cloud Plus Security
sponsored by Salesforce
WHITE PAPER: This white paper provides an overview of Salesforce’s principles of trust and compliance specifically for Salesforce Government Cloud Plus in the context of Federal Risk and Authorization Management Program (FedRAMP) and the DoD Cloud Computing Security Requirements Guide (CC SRG). Download your copy to learn more.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Salesforce

Access & Protect your Data – Anywhere, Anytime
sponsored by HelpSystems
DATA SHEET: In this brief, learn how Titus and Dataguise can help bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable and vulnerable data wherever it resides.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

HelpSystems

The Evolution of Evidence Collection
sponsored by Aptible
EBOOK: Evidence collection is mundane & exhausting, and what’s worse is that it can happen once a quarter or more. But despite its time-consuming nature, evidence collection is critical to passing an audit & proving compliance. By reading this guide, you can learn how to leverage automation to make evidence collection a bit less painful.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

Aptible

Intelligent Privacy Automation: The Future of Data Privacy
sponsored by ServiceNow
WHITE PAPER: Growing privacy concerns and emerging data privacy laws require organizations to not only know the location and usage of all personal data, but operationalize their privacy policies and accommodate a timely response to data access requests. But how can you ensure you’re always in compliance? Read this white paper to get the answer.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Beyond Digital Risk— Addressing Operational Risk
sponsored by ServiceNow
WHITE PAPER: Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Placing compliance at the front of your customer strategy
sponsored by ServiceNow
VIDEO: Volksbank is a ‘front-runner‘ in implementing integrated their Risk and Compliance across their entire organization. Starting 3 years ago with GRC to Integrated Risk management with 1 system to have a ‘single source of truth’. Join this webinar to learn from best practices with IRM at the Volksbank.
Posted: 06 Nov 2020 | Premiered: 06 Nov 2020

ServiceNow

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

How to Comply with PCI-DSS 4.0
sponsored by ColorTokens
RESOURCE: PCI-DSS 4.0 is expected to roll out mid-2021, and organizations are preparing their compliance strategies to reflect the expected adjustments. This article provides an overview of what will change in PCI-DSS 4.0, what will carry over, and how to pick a technology partner to help achieve compliance.
Posted: 05 Oct 2020 | Published: 05 Jun 2020

ColorTokens

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

Tax Automation reduces costs and meets security and compliance requirements
sponsored by Pulsant
CASE STUDY: In this case study, follow Tax Automation, a tax software company based in the UK, as they partner with Pulsant to streamline the delivery and accessibility of their offerings through a transition towards a SaaS model. Read on to discover the Tax Automation’s challenges, required capabilities and results.
Posted: 20 Aug 2020 | Published: 20 Aug 2020


Discover the Governance and Compliance Features of Microsoft Teams
sponsored by Insight
WEBCAST: In this webcast, the speaker dives into the significance of planning for governance, maintaining compliance, and lays out how Insight can help. Access it here.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020

Insight

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

Avoiding Data Leaks with Scalable Encryption and Access Controls
sponsored by Thales
PRODUCT OVERVIEW: Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Thales

The Business of Data Security
sponsored by Citrix
EBOOK: As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

Big data security management embraces governance, privacy
sponsored by SearchDataManagement
EBOOK: Cyberattacks, GDPR and CCPA compliance, and the COVID-19 pandemic present serious challenges to big data security management practices. Data managers look to a combination of governance policies and evolving data security tools to protect the quality and integrity of their data stores.
Posted: 06 Nov 2020 | Published: 06 Nov 2020

SearchDataManagement
1 - 25 of 70 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info