Research Library

Powered by

Compliance (Systems Operations) Research

  • Achieving HIPAA Compliance

    Sponsored by: Absolute Software Corporation

    Tap into this HIPAA Compliance Guide to see how Absolute can help you eliminate compliance failures and provide you with endpoint visibility and control.

  • Global Law Firm Secures Client Data and Achieves Compliance

    Sponsored by: Absolute Software Corporation

    In this case study, learn how Absolute helped Ogletree Deakins, one of the largest global law firms, keep their data secure and remain compliant with regulations such as the GDPR.

  • HIPAA Compliance Evaluation Guide

    Sponsored by: Absolute Software Corporation

    To comply with the HIPAA Privacy Rule and Security Rule, Covered Entities (CEs) and their business associates must implement administrative, physical, and technical safeguards across their endpoint populations. In this guide, see how Absolute can help.

  • Meeting Compliance Requirements with GoAnywhere

    Sponsored by: Help/Systems

    In this on-demand webinar, you will find everything you need to know from the basics of compliance, non-compliance costs, penalties, and fines of several regulations such as PCI DSS, GDPR, HIPAA, FISMA, and more. View now to see how GoAnywhere Security Managed File Transfer can help.

  • Governance, Risk, and Compliance: Use Case Guide

    Sponsored by: ServiceNow

    Tap into this guide to see how an integrated risk program on a common platform can help continuously monitor for risk and compliance across the extended enterprise, holistically prioritize risk based on business impact to improve decision making, and much more.

  • GRC Continuous Monitoring and Configuration for Compliance

    Sponsored by: ServiceNow

    Learn how you can quickly respond to configuration issues based on the risk they present to your business with Continuous Monitoring from ServiceNow.

  • 2020 Sales Tax Changes

    Sponsored by: Avalara

    Local sales and use tax rates often change in many states at the start of each year—which is what happened on January 1, 2020. Learn about the new regulations that took effect in 25 states, and how sales tax automation software can help you adjust in this white paper.

  • HITECH Compliance Evaluation Guide

    Sponsored by: Absolute Software Corporation

    The Health Information Technology for Economic and Clinical Health (HITECH) Act, is a United States Federal law that urges organizations to digitize medical records and demonstrate meaningful use of electronic health records (EHR). To comply, organizations need persistent endpoint visibility and control. Read on to learn how Absolute can help.

  • Acquire Companies, Not Tax Headaches

    Sponsored by: Avalara

    Mergers and acquisitions are key strategies in business growth, but from an operational standpoint, they can present challenges—especially if you’re merging a mission-critical system like an ERP. Download this white paper for tips on how to successfully integrate ERP systems after a merger.

  • Taking Your Business in a New Direction

    Sponsored by: Avalara

    Download this paper to explore how shifting products and sales channels can impact tax compliance — as well as best practices to successfully navigate these changeswhile minimizing risk.

  • Denver Simplifies and Accelerates Vendor Risk Management with ServiceNow

    Sponsored by: ServiceNow

    For the city and county of Denver, information security is critical. The organization deals with many different types of sensitive information, including the personal data of its citizens. This case study reveals how ServiceNow was able to simplify its vendor experience with a risk survey portal, automated backend processes, and much more.

  • CJIS Security Policy Evaluation Guide

    Sponsored by: Absolute Software Corporation

    IT and Information Security teams need to be equipped with powerful, versatile tools that will allow them to increase their operational efficiency. Download this overview to see how Absolute helps protect regulated data, eliminate compliance failures, and respond rapidly to security exposures.

  • WCAG 2.1: Exploring the New Success Criteria

    Sponsored by: Level Access

    What do you know about digital accessibility and WCAG? Given that the 2.1 version was released a little over a year ago, many people are still struggling to catch up with the new rules. Learn about WCAG 2.1 in this blog post, and the criteria you would need to meet to be digitally accessible.

  • Mitigating IP Risk: Three Strategies to Ensure Open Source Compliance

    Sponsored by: Fossa

    As open source software continues to be adopted at an increasing rate, compliance with open source licenses becomes a more pressing initiative. Download this white paper for 3 strategies you can use to ensure open source compliance.

  • Efinity: A Case Study

    Sponsored by: CloudLinux

    Efinity deals with a lot of personal data and in the light of recent data breaches, they kept getting compliance questions from their customers: did they have the SOC 2 certification? Learn how KernelCare allowed them to become fully compliant and enabled them to prove to their customers that they can be trusted with their data.

  • How KernelCare’s Live Patching Software Can Promote SOC 2 Compliance & Certification

    Sponsored by: CloudLinux

    Increasingly, cloud computing companies that want to attract business need to demonstrate SOC 2 certification. Read on to discover what SOC 2 is, why it matters, and how KernelCare can help you with vulnerability management – a crucial component of SOC 2 compliance.

  • Egress Risk-Based Protection

    Sponsored by: Egress Software Technologies Inc

    In this data sheet, discover the benefits and key capabilities of Egress Risk-based Protection and how it can help your organization share sensitive data with confidence.

  • Key Steps in Satisfying Your CCPA and Other Privacy Obligations

    Sponsored by: Egress Software Technologies Inc

    Millions of businesses worldwide will be subject to the CCPA. Is yours prepared? Download this Osterman Research white paper to learn everything you need to know about the new regulation including, how to prepare, why it’s important, and solutions that should be implemented.

  • Supporting GRC with Business Continuity and Disaster Recovery

    Sponsored by: Cirrus Data Solutions

    Read this exclusive guide to discover how BC can support GRC initiatives and how to use the data acquired during BIA and RA activities to support GRC.

  • CCPA Compliant Email Security

    Sponsored by: Egress Software Technologies Inc

    In this Egress product datasheet, learn how you can remain CCPA compliant by preventing breaches, protecting regulated data, fulfilling DSARs, and auditing your email network.

  • Webinar recording: The Importance of Live Patching for Linux Kernel Vulnerabilities

    Sponsored by: CloudLinux

    When it comes to Linux operating systems, security patching can be a time-consuming and often disruptive event. In this webinar, go in-depth into Linux kernel live security patches; what they are, how they work, who should be using it – and why.

  • Appian For Insurance GDRP Compliance

    Sponsored by: Appian

    Failure to meet GDPR compliance could mean significant regulatory enforcement actions, reputational damage, and loss of customer trust. Read this whitepaper to learn how you can use a low-code development tool to help ensure compliance today.

  • Security Starts at the Edge

    Sponsored by: Akamai Technologies

    Whether you’re a leader of a large enterprise or a smaller business, part of your ongoing security, risk management, and compliance strategy will be sourcing the most effective security solution for your business. In this guide, for learn how you can find the right solution for your business to scale resilience, build trust, and drive revenue.

  • Achieving Compliance and Reducing Risk

    Sponsored by: Comforte AG

    Mercury Processing Services International needed a solution that would properly meet key requirements of GDPR and PCI DSS, as well as add another layer of protection that renders data useless to potential hackers. In this video, see how comforte’s enterprise data protection platform helped Mercury fulfill their data security requirements.

  • The Digital Nexus in Banking

    Sponsored by: Hitachi Vantara

    With Hitachi, achieving the level of regulatory compliance your business needs become a lot easier while managing data becomes less of an arduous task. To learn about the 3 major benefits of managing data with Hitachi and to go over the provided compliance maturity checklist, read this e-book.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.