ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Audits Research

  • SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation

    Sponsored by: BWise

    This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.

  • Prepare for Vendor Audits and Improve Software Asset Management with Integrated IBM Solutions

    Sponsored by: IBM

    Read how effective software asset management supports both cost effectiveness and cost efficiency by matching inventory with actual deployments, thereby helping to reduce over- and under-licensing.

  • E-Book: Data Protection Plans for Complying with Privacy Laws

    Sponsored by: TechTarget Security

    This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!

  • Data Loss Prevention for IBM i

    Sponsored by: Innovatum, Inc.

    Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.

  • Five Challenges to Continuous PCI DSS Compliance

    Sponsored by: Tripwire, Inc.

    As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.

  • Center for Charter Schools at Central Michigan University Uses DocAve to Migrate Mission-Critical SharePoint Data

    Sponsored by: AvePoint, Inc.

    The Center for Charters at CMU needed a unified platform upon which to collaborate effectively, store digital assets efficiently, and maintain industry compliant audit histories. Read this case study to learn how they used DocAve SharePoint Migrator for a hassle-free migration into MOSS with no metadata loss.

  • Governance, Risk, Compliance: Policy Management Methods and Tools

    Sponsored by: Symantec Corporation

    IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions.

  • Presentation Transcript: Getting Set for e-Discovery

    Sponsored by: Symantec Corporation

    In this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.

  • Seven Practical Steps for Federal Cyber Security and FISMA Compliance

    Sponsored by: Tripwire, Inc.

    This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.

  • Essential Guide to PCI DSS

    Sponsored by: Information Security Magazine

    This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.

  • Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console

    Sponsored by: Oracle Corporation

    This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.

  • LogRhythm 3-Minute Product Demo

    Sponsored by: LogRhythm, Inc.

    This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.

  • The Path to IFRS Conversion: Considerations for the banking and capital markets industry

    Sponsored by: Deloitte

    As acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.

  • IFRS in the Life Sciences: Broad implications

    Sponsored by: Deloitte

    This paper provides practical industry insights on IFRS for life science executives and includes useful sections on: IFRS challenges and opportunities in life sciences; Implications of IFRS for financial reporting, tax, human resources, mergers and acquisitions, IT, and treasury and much more.

  • Leveraging a Maturity Model to Achieve “Proactive Compliance”

    Sponsored by: Symantec Corporation

    Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.

  • PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    Sponsored by: Tripwire, Inc.

    What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.

  • SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    Sponsored by: Tripwire, Inc.

    SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.

  • The Best PCI Audit of Your Life

    Sponsored by: Lumension

    This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.

  • Buckle Up (On the Road to IFRS) Straight Talk Book Series

    Sponsored by: Deloitte

    The 11th book in our Straight Talk series helps executives understand the implications of IFRS and their role in addressing the associated changes. The publication also offers practical suggestions to help companies navigate through pressing issues and developing your own conversion road map.

  • Technology Implications of IFRS adoption for U.S. Companies: More than a technical accounting change

    Sponsored by: Deloitte

    In this publication, we explore the technology implications associated with IFRS conversion and discuss: Evaluating the potential technology impact; how companies can prepare technology and systems changes related to IFRS adoption; Major differences between U.S. Generally Accepted Accounting Principles (GAAP) and IFRS and much more.

  • Top Five Ways to Improve E-Discovery with Archiving

    Sponsored by: Symantec Corporation

    Organizations are increasingly being ordered to produce email messages and other files relevant to electronic discovery - and the penalties for noncompliance with a court's discovery order can be severe. Thus it is vital that every organization manage its electronic data for fast, easy, accurate retrieval when required.

  • The Massachusetts Data Protection Law

    Sponsored by: TechTarget Security

    Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

  • Meeting Compliance Objectives in SharePoint®

    Sponsored by: AvePoint, Inc.

    This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.

  • Web Application Security Trends Report Q3-Q4, 2008

    Sponsored by: Cenzic

    Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.

  • Closing the Gaps in Root Access Control

    Sponsored by: BeyondTrust Corporation

    Read this discussion to learn how enterprises can take more effective control of access to the functionality at the heart of many of IT's most critical systems and meet the challenges presented by security and compliance standards.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.