ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Audits White Papers

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Data protection rises up business agenda

    Sponsored by: TechTarget ComputerWeekly.com

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Preparing for Personal Data Privacy Policies

    Sponsored by: Micro Focus

    As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.

  • EU GDPR Compliance puts Focus on Data Tracking, Encryption

    Sponsored by: The Media Trust

    GDPR compliance is mandatory by May 25, 2018. Discover how encryption will be an overlooked but key part in compliance, as well as how to reduce risk by avoiding keeping more personal data than is necessary for business/legal needs.

  • How to Keep Cloud Services Compliant with HIPAA Standards

    Sponsored by: Actiance

    In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.

  • IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise

    Sponsored by: IBM

    Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.

  • Protecting Your Critical Data with Integrated Security Intelligence

    Sponsored by: IBM

    Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.

  • Avoiding Audits - How to Get Of Software Vendors’ Radar

    Sponsored by: Hewlett-Packard Enterprise

    Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.

  • Optimize Value of Enterprise Software with App Usage Management

    Sponsored by: Flexera Software

    Ensuring software license compliance and optimizing spend aren't easy -- complex agreements, virtualization, BYOD, and other trends make it difficult to understand and demonstrate compliance. But when you can't afford overspend on software, what can you do?

  • Top 10 Reasons Australian Businesses Automate Their Expenses

    Sponsored by: Concur Technologies

    The following white paper explores the top 10 reasons why businesses need to consider automating their travel and expense management processes. Learn how you can gain 28% faster approval processes, 22% greater policy compliance, 40% cost reduction, and more.

  • Revolutionizing Home Entertainment

    Sponsored by: Adobe EchoSign

    The following case study explores how by leveraging Adobe EchoSign, TiVo was able to remove days off their contract lifecycle, increased control and visibility into the workflow, as well as improved audit trails for their internal records. Read on to learn how you can achieve similar results.

  • How to Create the Most Effective Compliance Program at Your Organization

    Sponsored by: IntraLinks, Inc

    In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.

  • Maintaining Continuous Compliance: A New Best-Practice Approach

    Sponsored by: IBM

    This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.

  • Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness

    Sponsored by: IBM

    This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.

  • 3 Strategies to Manage Compliance Mandates

    Sponsored by: Citrix

    This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.

  • Transferring Data without Secure Protocols?

    Sponsored by: Globalscape

    This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.

  • A Provocative Approach to Integrated Security Intelligence and Vulnerability Management

    Sponsored by: IBM

    This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.

  • Simplify implementation of the HITRUST Common Security Framework

    Sponsored by: Symantec Corporation

    Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.

  • Industry Perspectives: The Impact of HIPAA and HITECH

    Sponsored by: Symantec Corporation

    This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.

  • E-Discovery Cross-Border Data Compliance

    Sponsored by: Exterro

    This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.

  • Importance of Information Governance for Records Managers

    Sponsored by: RSD

    The following white paper explores the importance of information governance for records managers today. Uncover a solution to today's information governance needs and how a successful initiative can minimize risk, improve the value of information, and more.

  • Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure

    Sponsored by: Imprivata

    This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.