ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Audits Research

  • Information Security Magazine, May 2009: Automating Compliance

    Sponsored by: Information Security Magazine

    This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.

  • Governance, Risk, Compliance: Policy Management - Methods and tools

    Sponsored by: TechTarget Security

    This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.

  • Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Addressing Compliance Initiatives with Center for Internet Security Benchmarks

    Sponsored by: Tripwire, Inc.

    This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

  • Laws, regulations and compliance: Top tips for keeping your data under your Control

    Sponsored by: Sophos UK

    The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.

  • Profiting from PCI Compliance

    Sponsored by: IBM

    This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.

  • Enabling Sustainable Compliance Management

    Sponsored by: IBM

    Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.

  • Achieving Compliance in a Virtualized Environment

    Sponsored by: Tripwire, Inc.

    The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.

  • Compliant Statement Archiving and Presentment for Financial Services

    Sponsored by: EMC Corporation

    Read this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements.

  • Expert Ebook: Mastering PCI

    Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

    This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.

  • LogRhythm and NERC CIP Compliance

    Sponsored by: LogRhythm, Inc.

    LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements.

  • The "Hard Truths" About Managing Administrative and Application Identities

    Sponsored by: CyberArk Software, Inc

    This videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.

  • Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications

    Sponsored by: Paymetric, Inc.

    Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.

  • The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere

    Sponsored by: Imperva

    Read this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.

  • A Pathway to PCI Compliance

    Sponsored by: Imprivata

    This white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.

  • Online Demo - Vulnerability Management & Policy Compliance Overview

    Sponsored by: Qualys, Inc.

    Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.

  • Turning RegNMS and MiFID Challenges into Opportunities

    Sponsored by: Infosys Technologies Limited

    RegNMS and MiFID aim to protect investors by ensuring best price on every execution. Read this paper to learn about solutions that will help organizations capitalize on RegNMS and MiFID compliance.

  • Project Workforce Management for Service Organizations

    Sponsored by: Tenrox

    Professional services automation is not flexible enough to overcome the challenges associated with delivering services. Read this paper to learn how project workforce management can improve collaboration between your organization and its customers.

  • Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them

    Sponsored by: VeriSign, Inc

    The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.

  • AppDetective

    Sponsored by: Application Security, Inc.

    Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.

  • Teamstudio Build Manager

    Sponsored by: Teamstudio, Inc.

    Teamstudio has developed Build Manager, a flexible and sophisticated build tool that helps automate your application build process, providing you with error-free builds, internal control and audit compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.