Software  >   Applications Software  >   Enterprise Applications Software  >  

Security Compliance Software

RSS Feed   
Security Compliance Software Reports
 
Compliance and More: Using Automation and AI to Detect Security and Compliance Risk in Modern Collaboration Platforms
sponsored by Theta Lake
CASE STUDY: Attivo Group is a collection of financial companies in the UK. To improve communications, they set out to shorten time-consuming call processes, become more proactive in compliance handling and reduce complexity in their growth-by-acquisition strategy. View this case study to learn how automation and AI helped the Group hit their targets.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Theta Lake

Ciphertrust Data Security Platform: Discover, Protect and Control
sponsored by Thales
DATA SHEET: IT security organizations are seeking a data-centric solution that secures the data as it moves from networks to applications and the cloud. When perimeter network controls and endpoint security measures fail, protecting data at rest is the last line of defense. Learn more by reading this data sheet on the CipherTrust data security platform.
Posted: 30 Oct 2020 | Published: 30 Sep 2020

Thales

Cybersecurity Maturity Model Certification (CMMC)
sponsored by BlueVoyant
WHITE PAPER: The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity requirement for DoD contractors and subcontractors designed to protect the handling of Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But what does the CMMC entail, and when will it come into effect? Read on to find out.
Posted: 08 May 2020 | Published: 08 May 2020

BlueVoyant

Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Simple Strategies for BYOD Compliance
sponsored by CDW Corporation
EGUIDE: This expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

The Adobe EchoSign advantage for financial services
sponsored by Adobe EchoSign
WHITE PAPER: E-signatures offer financial institutions sustainable competitive advantages while meeting high industry standards. Access this white paper to learn more.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Adobe EchoSign

Understanding the Data Management Challenges of Dodd-Frank
sponsored by Bloomberg
PRESENTATION TRANSCRIPT: Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

Bloomberg

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info