Compliance Auditing Reports

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Best Practices for Managing the Increasing Depth of Compliance Regulation
sponsored by IBM
EGUIDE: According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.
Posted: 18 May 2011 | Published: 18 May 2011

IBM

Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Using Predictive Coding to Your E-Discovery Advantage
sponsored by TechTarget CIO
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

TechTarget CIO

eBook: Trends in Healthcare Data Protection
sponsored by LANDesk Software
EBOOK: This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
Posted: 22 Mar 2012 | Published: 22 Mar 2012

LANDesk Software

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Presentation Transcript: Has Your QSA Thrown You Under a Bus?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Data Centre Energy Efficiency IT Handbook
sponsored by TechTarget Data Center
EBOOK: The deadline for the UK's Carbon Reduction Commitment scheme has now passed, and companies will begin to receive fines if they can't demonstrate how they've reduced their carbon footprint or are putting processes in place to do so. This expert IT handbook offers detailed information about this new regulation and how organisations can adhere to it.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

TechTarget Data Center

Strategies for Writing a HIPAA-friendly BYOD Policy
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
Posted: 01 Aug 2013 | Published: 05 Mar 2013

HP & Intel®