ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Audits Research

  • 2024 GRC Strategies, Teams, and Outcomes Report

    Sponsored by: LogicGate

    One in three organizations can’t proactively manage risk with their current GRC program. In partnership with Osterman Research, this report shares results for new 2024 GRC Strategies, Teams, and Outcomes Report from 350 risk, cybersecurity, and compliance leaders from around the world and across industries. Download the report for all the findings.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Data protection rises up business agenda

    Sponsored by: TechTarget ComputerWeekly.com

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

  • CW APAC, June 2020: Trend Watch - data protection

    Sponsored by: TechTarget ComputerWeekly.com

    Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.

  • State of GDPR in mainland Europe

    Sponsored by: TechTarget ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Preparing for Personal Data Privacy Policies

    Sponsored by: Micro Focus

    As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.

  • EU GDPR Compliance puts Focus on Data Tracking, Encryption

    Sponsored by: The Media Trust

    GDPR compliance is mandatory by May 25, 2018. Discover how encryption will be an overlooked but key part in compliance, as well as how to reduce risk by avoiding keeping more personal data than is necessary for business/legal needs.

  • How to Keep Cloud Services Compliant with HIPAA Standards

    Sponsored by: Actiance

    In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.

  • IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise

    Sponsored by: IBM

    Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.

  • Protecting Your Critical Data with Integrated Security Intelligence

    Sponsored by: IBM

    Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.

  • Avoiding Audits - How to Get Of Software Vendors’ Radar

    Sponsored by: Hewlett-Packard Enterprise

    Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.

  • SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring

    Sponsored by: Idera

    DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.

  • Optimize Value of Enterprise Software with App Usage Management

    Sponsored by: Flexera Software

    Ensuring software license compliance and optimizing spend aren't easy -- complex agreements, virtualization, BYOD, and other trends make it difficult to understand and demonstrate compliance. But when you can't afford overspend on software, what can you do?

  • Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing

    Sponsored by: WANdisco

    Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.

  • Top 10 Reasons Australian Businesses Automate Their Expenses

    Sponsored by: Concur Technologies

    The following white paper explores the top 10 reasons why businesses need to consider automating their travel and expense management processes. Learn how you can gain 28% faster approval processes, 22% greater policy compliance, 40% cost reduction, and more.

  • Revolutionizing Home Entertainment

    Sponsored by: Adobe EchoSign

    The following case study explores how by leveraging Adobe EchoSign, TiVo was able to remove days off their contract lifecycle, increased control and visibility into the workflow, as well as improved audit trails for their internal records. Read on to learn how you can achieve similar results.

  • How to Create the Most Effective Compliance Program at Your Organization

    Sponsored by: IntraLinks, Inc

    In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.

  • Maintaining Continuous Compliance: A New Best-Practice Approach

    Sponsored by: IBM

    This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.

  • Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness

    Sponsored by: IBM

    This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.

  • 3 Strategies to Manage Compliance Mandates

    Sponsored by: Citrix

    This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.

  • Transferring Data without Secure Protocols?

    Sponsored by: Globalscape

    This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.

  • A Provocative Approach to Integrated Security Intelligence and Vulnerability Management

    Sponsored by: IBM

    This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.

  • Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions

    Sponsored by: Symantec Corporation

    View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.