ComputerWeekly.com Research Library

Powered by Bitpipe.com

Sarbanes-Oxley Compliance Research

  • Cybersecurity Compliance Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.

  • Streamline Compliance & Automate Audit Efforts

    Sponsored by: Onapsis

    Learn how Onapsis allows you to deliver actionable risk intelligence, continuous threat monitoring, and automated policy and risk governance.

  • Webinar: Practical Examples for Achieving and Maintaining DevOps Compliance for Financial Institutions

    Sponsored by: WANdisco

    Banking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.

  • Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions

    Sponsored by: Symantec Corporation

    View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.

  • 2013 Data Governance Survey Results

    Sponsored by: Rand Secure Data

    Check out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.

  • 7 Steps To Getting A Handle On Social Application In Your Enterprise

    Sponsored by: Jive Software

    Social media is a huge part of your employees' personal lives, so why shouldn't it be integrated into their work lives as well? While some executives might be wary of incorporating social media in the workplace, they really shouldn't be. With the right management tactics, you can get the benefits of social media while still remaining in control.

  • Better Security Intelligence for the Finance Industry

    Sponsored by: IBM

    A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.

  • APTARE StorageConsole Backup Manager

    Sponsored by: APTARE

    This informative paper examines a backup and recovery software solution that can help you increase your backup and restore success, streamline compliance, improve backup performance and much more. Read on to learn more.

  • Eight Tips to Safeguard Your Business Information

    Sponsored by: Iron Mountain

    Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • File Archive: the next big thing?

    Sponsored by: EMC Corporation

    Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • An On-Demand Sourcing Solution for Rapid and Sustainable Savings

    Sponsored by: SAP America, Inc.

    Many procurement organizations struggle to meet savings goals with an overworked staff using time-consuming, manual processes or outdated systems. Read this paper to learn how to better collaborate with key stakeholders, qualify suppliers, ensure a competitive bidding process, and negotiate contract terms with suppliers.

  • Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System

    Sponsored by: Iron Mountain

    Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.

  • Governance and control: Focus risk management on multiple levers of control

    Sponsored by: IBM

    Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.

  • FAQ Guide: Regulatory Compliance Issues Drive Some IT Shops to Data Archive Appliances

    Sponsored by: IBM

    Check out this SearchStorage.com FAQ guide to learn about the latest developments and the evolution of data archiving technology, the key characteristics of different appliances and more.

  • Managing the Transition to IFRS

    Sponsored by: Oracle Corporation

    Listen to this podcast with David Jones, Director at PWC, who has worked with multi-national companies across Europe helping them to make the transition to adopting IFRS and to improve their financial reporting in the process.

  • The IBM Data Governance Unified Process: Driving Business Value with IBM Software and Best Practices Book (Sunil Soares)

    Sponsored by: IBM

    This 150 page book by Sunil Soares provides a practical set of detailed steps and sub-steps to implement an Information Governance program, as well as the associated automation provided by IBM Software.

  • E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems

    Sponsored by: Safestone Technologies

    This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.

  • November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management

    Sponsored by: Information Security Magazine

    November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!

  • Revamping and optimizing your SAP GRC strategy

    Sponsored by: Security Weaver

    GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.

  • Case Study: Fortune 100 Insurance Company and Security Weaver

    Sponsored by: Security Weaver

    For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.

  • Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver

    Sponsored by: Security Weaver

    In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.

  • Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt

    Sponsored by: BigFix

    In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.

  • E-Guide A Decision Maker’s Guide to Log Management

    Sponsored by: ArcSight, an HP Company

    While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.