ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Software Research

  • Financial markets regulatory outlook 2017

    Sponsored by: ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • Using Logs to Address Compliance Standards

    Sponsored by: Logentries

    In this white paper, learn common log requirements in 3 major industries, what to look for in a log management tool, real-world examples of how to use a log management system for investigative issues, and more.

  • Best Practices for E-Discovery and Regulatory Compliance

    Sponsored by: Proofpoint, Inc.

    This Osterman Research white paper offers some best practices for how organizations can meet compliance requirements using Office 365. Find out how integrating 3rd party programs can build compliance capabilities in environments that operate in both Microsoft and non-Microsoft programs.

  • Game Over: 3 Scenarios Where Compliance Isn't Enough

    Sponsored by: Armor

    Discover 3 real-world "game over" scenarios to show you why simply being compliant isn't enough. Learn why compliance is just a basic first step, highlighting the need for real, proactive and ongoing security controls.

  • Achieve Both Compliance and Innovation

    Sponsored by: Chef Software

    Discover how it's possible to achieve both compliance and innovation. Learn how compliance can become simply another step on the assembly line and the idea of infrastructure as code, which allows your enterprise to specify its compliance-related requirements in ways that can be automatically tested.

  • Evolution of Regulatory Capital Planning, Measurement, and Management

    Sponsored by: SAS

    A key drawback of the Basel framework is its focus on historical capital adequacy, which does not help assess the impact of stress events on banks. Learn about how banks need an appropriate system to combine compliance with these risk-based capital adequacy regulations.

  • How a Top 10 Bank Uses A Data Analytics Tool to Manage Operational Risk

    Sponsored by: Infogix

    In this case study, learn about the analytics tool a top 10 U.S. Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including reduced costs while increasing productivity, processed full audit in real time, and more.

  • Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.

  • 3 Ways to Cut the Cost and Pain of a Software Audit

    Sponsored by: BDNA

    This white paper examines the top challenges IT professionals face when preparing for a vendor audit, as well as offering suggested solutions to cut the cost and pain of a software audit. Download now to access expert tips on how to prepare for your vendor audit.

  • The Importance of Data Analysis When Optimizing Guidewire

    Sponsored by: Infogix

    In this white paper you will discover a data quality system that can help your organization ensure consistency, accuracy and most importantly, visibility into the health of your data controls.

  • Financial Instruction Advantage and the Optimization of Information Processing

    Sponsored by: SAS

    This white paper shows you a greater capability of model risk assessment. Avoid headline-grabbing risks and pressure from regulators by anticipating what's coming.

  • Enterprise Stress Testing Systems from Chartis

    Sponsored by: SAS

    Read this white paper to learn about compliance best practices for financial institutions to adopt.

  • Top 3 Cloud Security Developments

    Sponsored by: SearchCloudSecurity.com

    This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.

  • The Unstructured Data Extinction: Automated Governance in the Digital Age

    Sponsored by: SearchCompliance.com

    Rapidly advancing technology is forcing big changes to companies' GRC practices. In this classroom, learn how modern technology is forcing companies to develop automated governance features to help ensure corporate data stays compliant and secure.

  • Aggravation or Aggregation: Risk Data and Compliance

    Sponsored by: SAS

    Access this survey now to uncover best practices that your bank may use as a guide in formulating a response to comply with BCBS 239 principles. Read on to learn more.

  • Addressing HACCP Issues Within the Food and Beverage Industry Using ERP Software

    Sponsored by: IFS

    Learn how your organization can put in place a system to comply with HACCP guidelines in this white paper. Uncover the importance of an effective ERP system in compliance for the purposes of gathering, tracking, and reporting functionality.

  • 4 Steps to Effectively Managing Risk and Compliance for Financial Services

    Sponsored by: IBM

    Learn why convergence is key to maximizing governance efforts, and discover the 4 steps financial services organizations can take to mitigate compliance risks.

  • 10 Characteristics of a HIPAA-Compliant ePHI Application

    Sponsored by: Coalfire

    The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.

  • Making the Case for Data-Aware Storage

    Sponsored by: DataGravity

    This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.

  • Compliant Calling: How Mobile Industry Regulations Influence Financial Services

    Sponsored by: BlackBerry

    In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.

  • Cloud Collaboration Ensures Compliance, Flight Safety

    Sponsored by: Microsoft

    This case study explores how an air navigation service provider they designed a mobile cloud app for their document review process to ensure better compliance, collaboration, and flight safety.

  • Pulse E-zine: Vol. 3, No. 2

    Sponsored by: SearchHealthIT.com

    While the health IT spotlight shifts to the release of stage 3 meaningful use guidelines, many providers are still struggling with stage 2 reporting. In this issue of Pulse, learn what's next for meaningful use, how it has affected EHRs, and how to align an analytics plan with the needs of your organization.

  • The Adobe EchoSign advantage for financial services

    Sponsored by: Adobe EchoSign

    E-signatures offer financial institutions sustainable competitive advantages while meeting high industry standards. Access this white paper to learn more.

  • The SOX Effect

    Sponsored by: SearchCompliance.com

    In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.