ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Audits Research

  • BigFix Inventory: Maintain Software Audit Readiness & Mitigate Security Risks

    Sponsored by: HCL Software

    Maintaining compliance audit readiness while mitigating the threats of today’s sophisticated cyberattacks can be an exhaustive and resource-intensive endeavor. BigFix Inventory is looking to offset some of the workload for you, read this solution brief to see how they can help with both of these initiatives.

  • Payoneer Achieves GDPR Readiness

    Sponsored by: Panorays

    For Payoneer, the introduction of the European Union’s GDPR exposed existing gaps in both their compliance and scalability capabilities. Read this case study to discover how they partnered with Panorays in order to address these challenges and achieve comprehensive, scalable GDPR compliance.

  • Mattress Firm: Security and innovation

    Sponsored by: Ivanti

    As enterprises grow, their competitive advantage relies on their ability to innovate. However, too often, IT teams are spending their effort on tedious, manual tasks, limiting their time to innovate. Read this case study to learn how Mattress Firm, through their partnership with Ivanti, were able to address this issue.

  • Compliance for Today’s Complex Audit

    Sponsored by: Ivanti

    The stress and worry surrounding compliance audits are avoidable – so long as your organization adopts a people-centric, policy-automated approach to IT operations that’s inherently audit-ready. But how should you go about this? Read this following e-guide, Compliance for Today’s Complex Audit, which offers a blueprint for this approach.

  • Access & Protect your Data – Anywhere, Anytime

    Sponsored by: HelpSystems

    In this brief, learn how Titus and Dataguise can help bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable and vulnerable data wherever it resides.

  • Major international retailer re-structures it’s mega vendor licensing with Livingstone Group

    Sponsored by: Livingstone Tech

    Oftentimes, universal licensing agreements (ULAs) make businesses pay more than necessary for the cost of convenience. With the headache of ULA management, many businesses start to question if that promise of convenience is even realized. Explore the alternatives to ULAs here.

  • Placing compliance at the front of your customer strategy

    Sponsored by: ServiceNow

    Volksbank is a ‘front-runner‘ in implementing integrated their Risk and Compliance across their entire organization. Starting 3 years ago with GRC to Integrated Risk management with 1 system to have a ‘single source of truth’. Join this webinar to learn from best practices with IRM at the Volksbank.

  • What You Should Know About Your Identity & Access Management

    Sponsored by: Beta Systems

    This 34-page whitepaper offers a comprehensive deep dive into Garancy Access Intelligence Manager (AIM) – an offering designed to help organizations monitor data sources, analyze access permissions, meet compliance requirements and address threats. Read on to learn more about its key features and capabilities.

  • IT-GRC Tools

    Sponsored by: ServiceNow

    IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.

  • Path to PCI-DSS 4.0: Simplifying Compliance and Securing Cardholder Data

    Sponsored by: ColorTokens

    PCI-DSS v4.0 is expected to arrive in late 2020/early 2021 – and organizations are beginning to prepare. This webinar provides an overview of PCI-DSS 4.0, including the expected changes, what will (likely) remain unchanged, how zero-trust fits in, and more – watch now to get started.

  • A Focused Approach to Managing Risk in Uncertain Times

    Sponsored by: ServiceNow

    As businesses emerge from the initial COVID-19 crisis, they are coming under immense pressure to adapt their risk and resilience programs to the evolving effects of COVID-19 and other potential disruption. In this white paper, uncover 4 steps businesses can take to help them become more resilient, control risks and maximize productivity.

  • How to Comply with PCI-DSS 4.0

    Sponsored by: ColorTokens

    PCI-DSS 4.0 is expected to roll out mid-2021, and organizations are preparing their compliance strategies to reflect the expected adjustments. This article provides an overview of what will change in PCI-DSS 4.0, what will carry over, and how to pick a technology partner to help achieve compliance.

  • Cybersecurity Compliance Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.

  • State of GDPR in mainland Europe

    Sponsored by: ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Egress Protect

    Sponsored by: Egress Software Technologies Inc

    Email protection strategies often fall short of meeting the necessary compliance and security requirements to adequately secure sensitive data being shared. In this solution brief, explore the key features and capabilities of Egress Protect, designed to intelligently secure emails and large files with the appropriate level of security.

  • Endpoint Controls

    Sponsored by: Cybereason

    In order to manage the modern cyberthreat landscape, organizations need security policies that ensure protection and compliance without impacting efficiency. This solution brief provides an overview of the key features of Cybereason Endpoint Security – read on to learn more.

  • Tax Automation reduces costs and meets security and compliance requirements

    Sponsored by: Pulsant

    In this case study, follow Tax Automation, a tax software company based in the UK, as they partner with Pulsant to streamline the delivery and accessibility of their offerings through a transition towards a SaaS model. Read on to discover the Tax Automation’s challenges, required capabilities and results.

  • Securing Big Data

    Sponsored by: Thales

    In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.

  • Vormetric Transparent Encryption for the SAP HANA® Data Management Suite

    Sponsored by: Thales

    While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.

  • Avoiding Data Leaks with Scalable Encryption and Access Controls

    Sponsored by: Thales

    Many organizations use Amazon S3 to store their sensitive data. However, in order to secure data in a cloud environment like S3, you need complete control of your data. In this white paper, discover how organizations are ensuring the data stored in their Amazon S3 is safe and complies with the strictest security regulations.

  • The Business of Data Security

    Sponsored by: Citrix

    As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Sponsored by: Thales

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • Where Law and Tech Will Collide in 2020

    Sponsored by: RSA Conference

    The acceleration of “tech disruption” across all industries is exacerbating privacy risks to consumers globally. NIST has released draft privacy controls, providing guidance for companies to manage privacy risks. Watch this RSA Conference webinar to see industry experts discuss where technology and the law might find friction in 2020.

  • Cloud Migration Challenges

    Sponsored by: BigID

    Cloud migrations are nearing the point of necessity – even for highly regulated and risk-averse organizations. So, how can these organizations minimize risk, ensure data privacy and avoid costly disruptions? Read on to learn more about the challenges of cloud migration and how BigID is helping organizations overcome these obstacles.

  • How to Ensure NIAP Mobile Application Compliance

    Sponsored by: NowSecure

    Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.