Compliance reporting software White Papers
-
7 free GRC tools for compliance professionals
Sponsored by: TechTarget ComputerWeekly.comAll organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.
-
Data protection rises up business agenda
Sponsored by: TechTarget ComputerWeekly.comThis 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
-
Financial markets regulatory outlook 2017
Sponsored by: TechTarget ComputerWeekly.comFinancial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
-
Big data security management embraces governance, privacy
Sponsored by: TechTarget Data ManagementCyberattacks, GDPR and CCPA compliance, and the COVID-19 pandemic present serious challenges to big data security management practices. Data managers look to a combination of governance policies and evolving data security tools to protect the quality and integrity of their data stores.
-
Boost Compliance in Accounting with AI
Sponsored by: ServiceNowView this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.
-
Managing Customer Data in the GDPR Era
Sponsored by: GearsDesignDownload this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance.
-
CFO Insights on Success: How Automation Can Help
Sponsored by: Concur TechnologiesThe following white paper to explore the current challenges and bottlenecks that face CIOs and FDs at the financial year-end. Learn the importance of automation technology and how it can drastically improve visibility, reporting, and ultimately, a simpler year-end.
-
Smart Changes, Big ROI: Leading Companies Automate Their Record-to-Report Processes
Sponsored by: IBMThe following white paper explores the 3 big areas companies need to address in order to improve their reporting accuracy and accounting. Learn how industry innovators are using automation to gain the reporting prowess they need. Also explore technology recommendations and more.
-
Workflow, governance and reporting – Solvency II
Sponsored by: IBMThe following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
-
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
Sponsored by: IBMThis informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
-
Importance of Information Governance for Records Managers
Sponsored by: RSDThe following white paper explores the importance of information governance for records managers today. Uncover a solution to today's information governance needs and how a successful initiative can minimize risk, improve the value of information, and more.
-
Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
Sponsored by: IxiaData intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
-
Guide to OCC updates to governance ruling
Sponsored by: Iron MountainConsult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
-
Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
Sponsored by: IxiaIt is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
-
Are Your File Transfer Methods Compliant?
Sponsored by: OpenTextThis paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
-
An insurance firm eases regulatory compliance while reducing risk
Sponsored by: IBMLearn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
-
CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
Sponsored by: LogRhythm, Inc.This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
-
eBook: Data Security in the E-discovery Process
Sponsored by: Dell and VMwareIn this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
-
Strategies to Maintain PCI DSS Compliance
Sponsored by: GeoTrust, Inc.This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
-
Tips to Develop the Right Retention Schedule for your Organization
Sponsored by: TechTarget CIOCheck in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
-
Using Predictive Coding to Your E-Discovery Advantage
Sponsored by: TechTarget CIOE-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
-
Enterprise Security: Why you need Effective Log Management
Sponsored by: TechTarget SecurityFor many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
-
Top considerations for manufacturing compliance software
Sponsored by: Epicor Software CorporationThis e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
-
Law & The Data Explosion
Sponsored by: Symantec CorporationThis white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
-
IT Decision Checklist: Security Information and Event Management
Sponsored by: HP Enterprise SecurityAs the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.