Compliance Management Software Reports

The Unstructured Data Extinction: Automated Governance in the Digital Age
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT: Rapidly advancing technology is forcing big changes to companies' GRC practices. In this classroom, learn how modern technology is forcing companies to develop automated governance features to help ensure corporate data stays compliant and secure.
Posted: 02 Feb 2016 | Premiered: 02 Feb 2016

TechTarget Security

Using An E-Signature Solution To Save Time and Money
sponsored by Adobe EchoSign
WHITE PAPER: The following white paper explores the top 8 reasons why you should consider an e-signature solution for your organization. Learn how e-signatures can vastly improve the time to close deals, improve compliance, save capital, and much more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Adobe EchoSign

Tips to Develop the Right Retention Schedule for your Organization
sponsored by TechTarget CIO
EBOOK: Check in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

TechTarget CIO

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
sponsored by IBM
PRODUCT LITERATURE: High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
Posted: 03 May 2010 | Published: 03 Feb 2010

IBM

IT Services Purchase Intentions 2013
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This survey of over 130 European IT professionals from Computer Weekly and TechTarget examines company's buying plans for IT services in 2013.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

TechTarget ComputerWeekly.com

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

Managing Customer Data in the GDPR Era
sponsored by GearsDesign
EGUIDE: Download this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

GearsDesign