Compliance reporting software

RSS Feed   
Compliance reporting software Reports
26 - 50 of 54 Matches Previous Page  |  Next Page
Creating a Compliance Culture: Best Practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report
sponsored by ComputerWeekly.com
WHITE PAPER: This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy, G-Cloud & Government Applications Store Programme Phase 2
sponsored by ComputerWeekly.com
WHITE PAPER: At the core of the programme is the vision of providing political, business and ICT leaders with greatly improved agility, flexibility and choice in the ICT that enables the public sector and to deliver substantial cost savings on both existing and new ICT services.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Smart Changes, Big ROI: Leading Companies Automate Their Record-to-Report Processes
sponsored by IBM
WHITE PAPER: The following white paper explores the 3 big areas companies need to address in order to improve their reporting accuracy and accounting. Learn how industry innovators are using automation to gain the reporting prowess they need. Also explore technology recommendations and more.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

IBM

Workflow, governance and reporting – Solvency II
sponsored by IBM
WHITE PAPER: The following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
Posted: 23 May 2014 | Published: 23 May 2014

IBM

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

Importance of Information Governance for Records Managers
sponsored by RSD
WHITE PAPER: The following white paper explores the importance of information governance for records managers today. Uncover a solution to today's information governance needs and how a successful initiative can minimize risk, improve the value of information, and more.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

RSD

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Guide to OCC updates to governance ruling
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Advances in Financial Disclosure and Risk Management
sponsored by IBM
WEBCAST: This on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.
Posted: 01 Nov 2013 | Premiered: Feb 5, 2013

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

An insurance firm eases regulatory compliance while reducing risk
sponsored by IBM
WHITE PAPER: Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

IBM

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Tips to Develop the Right Retention Schedule for your Organization
sponsored by SearchCIO.com
EBOOK: Check in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

SearchCIO.com

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AT&T Cybersecurity
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AT&T Cybersecurity

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

Using Predictive Coding to Your E-Discovery Advantage
sponsored by SearchCIO.com
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

SearchCIO.com

Enterprise Security: Why you need Effective Log Management
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE: As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

HP Enterprise Security
26 - 50 of 54 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences