Sarbanes-Oxley Compliance White Papers
-
2013 Data Governance Survey Results
Sponsored by: Rand Secure DataCheck out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.
-
7 Steps To Getting A Handle On Social Application In Your Enterprise
Sponsored by: Jive SoftwareSocial media is a huge part of your employees' personal lives, so why shouldn't it be integrated into their work lives as well? While some executives might be wary of incorporating social media in the workplace, they really shouldn't be. With the right management tactics, you can get the benefits of social media while still remaining in control.
-
Better Security Intelligence for the Finance Industry
Sponsored by: IBMA security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
-
APTARE StorageConsole Backup Manager
Sponsored by: APTAREThis informative paper examines a backup and recovery software solution that can help you increase your backup and restore success, streamline compliance, improve backup performance and much more. Read on to learn more.
-
Eight Tips to Safeguard Your Business Information
Sponsored by: Iron MountainCheck out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
-
An On-Demand Sourcing Solution for Rapid and Sustainable Savings
Sponsored by: SAP America, Inc.Many procurement organizations struggle to meet savings goals with an overworked staff using time-consuming, manual processes or outdated systems. Read this paper to learn how to better collaborate with key stakeholders, qualify suppliers, ensure a competitive bidding process, and negotiate contract terms with suppliers.
-
Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System
Sponsored by: Iron MountainCheck out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.
-
Governance and control: Focus risk management on multiple levers of control
Sponsored by: IBMWritten by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
-
FAQ Guide: Regulatory Compliance Issues Drive Some IT Shops to Data Archive Appliances
Sponsored by: IBMCheck out this SearchStorage.com FAQ guide to learn about the latest developments and the evolution of data archiving technology, the key characteristics of different appliances and more.
-
The IBM Data Governance Unified Process: Driving Business Value with IBM Software and Best Practices Book (Sunil Soares)
Sponsored by: IBMThis 150 page book by Sunil Soares provides a practical set of detailed steps and sub-steps to implement an Information Governance program, as well as the associated automation provided by IBM Software.
-
E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: Safestone TechnologiesThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
Sponsored by: Information Security MagazineNovember's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
-
Revamping and optimizing your SAP GRC strategy
Sponsored by: Security WeaverGRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
-
Case Study: Fortune 100 Insurance Company and Security Weaver
Sponsored by: Security WeaverFor the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
-
Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
Sponsored by: Security WeaverIn January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
-
Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt
Sponsored by: BigFixIn this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.
-
E-Guide A Decision Maker’s Guide to Log Management
Sponsored by: ArcSight, an HP CompanyWhile often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
-
SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
Sponsored by: BWiseThis E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
-
The Top 10 Reasons to Automate Your AP Processes
Sponsored by: Kofax, Inc.This white paper examines in detail the relevant issues and benefits of Accounts Payable (AP) transformation as well as recent industry-wide research and best practices around such initiatives.
-
How the Guardium Platform Helped Dell IT Simplify Enterprise Security
Sponsored by: Guardium, an IBM CompanySafeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.
-
E-Guide: Information Security Essential Guide to Compliance
Sponsored by: Information Security MagazineCompliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
-
IDC White Paper: Effective Information Security
Sponsored by: CA (India) Technologies Pvt. LtdSecuring personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...
-
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
Sponsored by: TechTarget SecurityRead this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
-
CollabNet Success Story: Agile CMMI
Sponsored by: CollabNetFacing pressure to deliver solutions quickly and meet rapidly changing priorities, investment banks are reluctant to change processes and adopt new tools. Learn how CollabNet enabled software development/change management process that would enable CMMI compliance while accommodating existing Agile development practices used by various teams.
-
Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager
Sponsored by: Novell, Inc.Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.