Software  >   Applications Software  >   Enterprise Applications Software  >  

Security Compliance Software

RSS Feed   
Security Compliance Software Reports
 
RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Building a Modern Information Governance Strategy
sponsored by Mimecast
WHITE PAPER: Many organizations are rethinking their information management programs. They are creating modern and easier-to-execute policies, developing comprehensive processes and deploying better technology, all of which drive compliance. In this white paper, learn how key security challenges can be addressed through a modern information governance strategy.
Posted: 11 Apr 2019 | Published: 28 Sep 2018

Mimecast

Public Records Modernization: Your Key to Compliance
sponsored by Smarsh
EGUIDE: Ensuring your recordkeeping efforts are cutting edge is your best strategy for avoiding fines and litigation resulting from public records gaps. In this crash-course guide, explore how modernizing your public recordkeeping solutions can help protect your organization from costly fines and bridge critical data gaps.
Posted: 20 Dec 2018 | Published: 19 Dec 2018

Smarsh

A Definitive Guide to Understanding and Meeting the CIS Critical Security Controls
sponsored by Rapid7
WHITE PAPER: The CIS controls supplement almost every other security framework and are a useful base for developing or assessing your security. However, with many methods out there for meeting them, implementing these controls can be a daunting project. This white paper will help you better understand how to approach and implement each of the key controls.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Rapid7

CCPA and Identity Verification
sponsored by IDology
WHITE PAPER: As 2020 approaches, companies should view CCPA as an opportunity to further engage with their customers, rather than an obstacle. In order to adhere to the requirements, implementing policies that follows the CCPA timeline is imperative.Download this whitepaper to discover why identity verification is so critical to ensuring compliance.
Posted: 14 Nov 2019 | Published: 12 Nov 2019

IDology

The Quick Guide to Payroll Compliance
sponsored by Mindshare - Sage
EGUIDE: How are you keeping up with the ever-changing compliance factors impacting the payroll function? This guide looks at frequent compliance challenges as reported by payroll experts, and offers best practices and solutions to help your payroll function run smoothly and confidently.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Mindshare - Sage

GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

Leading International Fintech Businesses in Consumer Credit
sponsored by Armor
CASE STUDY: As the Quint Group continued its global expansion, it was critical that the platforms supporting the business were secure and scalable. As a result, they were looking for a new platform that had security built in. In this case study, learn why the Quint Group decided to move their infrastructure to Armor.
Posted: 01 May 2019 | Published: 01 May 2019

Armor

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement