Software  >   Applications Software  >   Enterprise Applications Software  >  

Security Compliance Software

RSS Feed   
Security Compliance Software Reports
 
ServiceNow Indicator Based Continuous Control Management
sponsored by ServiceNow
WHITE PAPER: Find out how Indicator-Based Continuous Control Management can benefit your compliance processes.
Posted: 05 Oct 2018 | Published: 31 May 2018

ServiceNow

Arctic Wolf Helps Maslon Elevate Its Cybersecurity and Meet Client Obligations
sponsored by Arctic Wolf
WHITE PAPER: Maslon, a Minneapolis law firm, recognized that active monitoring was a requirement and they needed to ensure they had the tools and resources to find potential threats 24/7. Read on to learn how Maslon found exceptional results using Managed Detection and Response (MDR).
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Guide to Compliant Archiving: Have Your Cake and Eat It Too in a Post-Email World
sponsored by Smarsh
WHITE PAPER: Despite the increased scope of data organizations need to capture and archive, new tools have simultaneously emerged to simplify and automate this process. Downloading this guide will assist you in achieving and maintaining compliance without impacting users' overall productivity.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Smarsh

Healthcare Compliance with Cornerstone
sponsored by Cornerstone OnDemand
WHITE PAPER: For hospitals juggling an array of ever-changing regulation requirements, maintaining compliance can seem impossible. In this white paper from Cornerstone, explore how a configurable learning platform is helping hospitals provide better patient care.
Posted: 10 Jan 2019 | Published: 10 Jan 2019

Cornerstone OnDemand

Understanding Your PCI DSS Guidelines: Successes and Failures
sponsored by SearchSecurity.com
EGUIDE: This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

SearchSecurity.com

Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER: This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017

Trend Micro, Inc.

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Simple Strategies for BYOD Compliance
sponsored by CDW Corporation
EGUIDE: This expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

The Unstructured Data Extinction: Automated Governance in the Digital Age
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Rapidly advancing technology is forcing big changes to companies' GRC practices. In this classroom, learn how modern technology is forcing companies to develop automated governance features to help ensure corporate data stays compliant and secure.
Posted: 02 Feb 2016 | Premiered: 02 Feb 2016

SearchCompliance.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement