ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance reporting software White Papers

  • 7 free GRC tools for compliance professionals

    Sponsored by: TechTarget ComputerWeekly.com

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

  • Data protection rises up business agenda

    Sponsored by: TechTarget ComputerWeekly.com

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

  • Financial markets regulatory outlook 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • Big data security management embraces governance, privacy

    Sponsored by: TechTarget Data Management

    Cyberattacks, GDPR and CCPA compliance, and the COVID-19 pandemic present serious challenges to big data security management practices. Data managers look to a combination of governance policies and evolving data security tools to protect the quality and integrity of their data stores.

  • Boost Compliance in Accounting with AI

    Sponsored by: ServiceNow

    View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.

  • Managing Customer Data in the GDPR Era

    Sponsored by: GearsDesign

    Download this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance.

  • CFO Insights on Success: How Automation Can Help

    Sponsored by: Concur Technologies

    The following white paper to explore the current challenges and bottlenecks that face CIOs and FDs at the financial year-end. Learn the importance of automation technology and how it can drastically improve visibility, reporting, and ultimately, a simpler year-end.

  • Smart Changes, Big ROI: Leading Companies Automate Their Record-to-Report Processes

    Sponsored by: IBM

    The following white paper explores the 3 big areas companies need to address in order to improve their reporting accuracy and accounting. Learn how industry innovators are using automation to gain the reporting prowess they need. Also explore technology recommendations and more.

  • Workflow, governance and reporting – Solvency II

    Sponsored by: IBM

    The following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.

  • A Provocative Approach to Integrated Security Intelligence and Vulnerability Management

    Sponsored by: IBM

    This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.

  • Importance of Information Governance for Records Managers

    Sponsored by: RSD

    The following white paper explores the importance of information governance for records managers today. Uncover a solution to today's information governance needs and how a successful initiative can minimize risk, improve the value of information, and more.

  • Best Practices for Lawful Intercept in Enterprise and Service Provider Networks

    Sponsored by: Ixia

    Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.

  • Guide to OCC updates to governance ruling

    Sponsored by: Iron Mountain

    Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.

  • Best Practices for Lawful Intercept in Enterprise and Service Provider Networks

    Sponsored by: Ixia

    It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.

  • Are Your File Transfer Methods Compliant?

    Sponsored by: OpenText

    This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.

  • An insurance firm eases regulatory compliance while reducing risk

    Sponsored by: IBM

    Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.

  • CARA Meets PCI Requirements and Gains Network Visibility: A Case Study

    Sponsored by: LogRhythm, Inc.

    This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!

  • eBook: Data Security in the E-discovery Process

    Sponsored by: Dell and VMware

    In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.

  • Strategies to Maintain PCI DSS Compliance

    Sponsored by: GeoTrust, Inc.

    This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.

  • Tips to Develop the Right Retention Schedule for your Organization

    Sponsored by: TechTarget CIO

    Check in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.

  • Using Predictive Coding to Your E-Discovery Advantage

    Sponsored by: TechTarget CIO

    E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.

  • Enterprise Security: Why you need Effective Log Management

    Sponsored by: TechTarget Security

    For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.

  • Top considerations for manufacturing compliance software

    Sponsored by: Epicor Software Corporation

    This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.

  • Law & The Data Explosion

    Sponsored by: Symantec Corporation

    This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.

  • IT Decision Checklist: Security Information and Event Management

    Sponsored by: HP Enterprise Security

    As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.