ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Software Research

  • Using An E-Signature Solution To Save Time and Money

    Sponsored by: Adobe EchoSign

    The following white paper explores the top 8 reasons why you should consider an e-signature solution for your organization. Learn how e-signatures can vastly improve the time to close deals, improve compliance, save capital, and much more.

  • CFO Insights on Success: How Automation Can Help

    Sponsored by: Concur Technologies

    The following white paper to explore the current challenges and bottlenecks that face CIOs and FDs at the financial year-end. Learn the importance of automation technology and how it can drastically improve visibility, reporting, and ultimately, a simpler year-end.

  • Enterprise Vault Archiving Overview

    Sponsored by: Symantec Corporation

    This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.

  • Maintaining Continuous Compliance: A New Best-Practice Approach

    Sponsored by: IBM

    This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.

  • 3 Strategies to Manage Compliance Mandates

    Sponsored by: Citrix

    This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.

  • A Provocative Approach to Integrated Security Intelligence and Vulnerability Management

    Sponsored by: IBM

    This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.

  • Industry Perspectives: The Impact of HIPAA and HITECH

    Sponsored by: Symantec Corporation

    This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.

  • Understanding E-Discovery Software Requirements

    Sponsored by: Exterro

    This IT buyer's guide dives into eDiscovery software requirements by highlighting the capabilities commonly needed by IT teams and how a web-based legal process management software suite meets these requirements.

  • Eliminating E-Discovery Over-Collection

    Sponsored by: Exterro

    This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.

  • How To Successfully Achieve Records Management Compliance and Strategy

    Sponsored by: Iron Mountain

    The following e-guide, created by the experts at SearchCompliance.com, offers advice and tips on navigating the records management landscape as well as how to best assure records management compliance. Read on to learn more.

  • Simple Strategies for BYOD Compliance

    Sponsored by: CDW Corporation

    This expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.

  • PCI DSS compliance 101

    Sponsored by: DellEMC and Intel®

    This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.

  • Data Center Designs to Help Meet Your Compliance Challenge

    Sponsored by: Iron Mountain

    This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.

  • Who’s Snooping on Your Email?

    Sponsored by: Sophos

    This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  • Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act

    Sponsored by: Absolute

    This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.

  • Million Dollar HIPAA Penalties for Healthcare

    Sponsored by: Absolute

    The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.

  • APTARE StorageConsole Backup Manager

    Sponsored by: APTARE

    This informative paper examines a backup and recovery software solution that can help you increase your backup and restore success, streamline compliance, improve backup performance and much more. Read on to learn more.

  • Are Your File Transfer Methods Compliant?

    Sponsored by: OpenText

    This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • Rules, risk and the potential for profit in the world of Basel III

    Sponsored by: IBM

    Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III

  • An insurance firm eases regulatory compliance while reducing risk

    Sponsored by: IBM

    Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.

  • CARA Meets PCI Requirements and Gains Network Visibility: A Case Study

    Sponsored by: LogRhythm, Inc.

    This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!

  • eBook: Data Security in the E-discovery Process

    Sponsored by: Dell and VMware

    In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.

  • Strategies to Maintain PCI DSS Compliance

    Sponsored by: GeoTrust, Inc.

    This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.

  • Tips to Develop the Right Retention Schedule for your Organization

    Sponsored by: TechTarget CIO

    Check in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.