Software  >   Applications Software  >   Enterprise Applications Software  >  

Regulatory Compliance Software

RSS Feed   
Regulatory Compliance Software Reports
 
Taking It In Stride: The Role of Cloud Compliance in Digital Transformation
sponsored by Horangi
WEBCAST: As organizations embrace cloud-native technologies such as Secure Access Secure Edge (SASE), they risk their infrastructure growing unnecessarily complex and non-compliant. Compliance in the cloud shouldn’t halt your digital transformation – view this webinar to learn how automation can help you achieve and maintain cloud compliance.
Posted: 30 Mar 2021 | Premiered: Mar 25, 2021

Horangi

Major international retailer re-structures it’s mega vendor licensing with Livingstone Group
sponsored by Livingstone Tech
CASE STUDY: Oftentimes, universal licensing agreements (ULAs) make businesses pay more than necessary for the cost of convenience. With the headache of ULA management, many businesses start to question if that promise of convenience is even realized. Explore the alternatives to ULAs here.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Livingstone Tech

How to Level Up Your Access Control
sponsored by Aptible
EBOOK: As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

Simplifying Cross-Framework Compliance Management
sponsored by Aptible
WEBCAST: Compliance professionals dread audits. With all of the standards and regulations organizations are held to, finding apt software to maintain compliance across multiple frameworks is an arduous process – until now. Check out this webcast from Aptible to get a look at how you can use automation to remove stress from audits.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

Aptible

Enabling Effective Data Protection
sponsored by InteliSecure
WHITE PAPER: Today, every company faces the potential for data loss. Threats are numerous and are coming from both internal and external actors. The need to quickly enable an effective data protection program has never been greater. In this white paper, learn how to shift your data protection approach to prioritize critical data asset protection.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

InteliSecure

How a Regional US Bank Met the Needs of Regulatory Examiners
sponsored by Atakama
CASE STUDY: A large regional US-based commercial bank was written up for several security deficiencies in a prior audit. In response, this bank wanted to deploy meaningful security solutions that went beyond the minimum expectations of regulatory examiners. View this case study to learn how Atakama helped this bank become compliant through encryption.
Posted: 03 Dec 2020 | Published: 30 Sep 2020

Atakama

Garancy Recertification Center
sponsored by Beta Systems
DATA SHEET: In order to ensure access permissions are continuously verified, certain compliance regulations require official recertification campaigns or records. In order to help organizations manage these recertifications, Beta Systems created their Garancy Recertification Center – read this data sheet to learn more about its key features and advantages.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Beta Systems

Reclaim Your Compliance Training
sponsored by Cornerstone OnDemand
WHITE PAPER: Download this white paper to learn how you can reclaim compliance training and move past negative connotations to get more value out of it.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Cornerstone OnDemand

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences