Security Compliance Software Reports

Using Predictive Coding to Your E-Discovery Advantage
sponsored by TechTarget CIO
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

TechTarget CIO

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

Managing Customer Data in the GDPR Era
sponsored by GearsDesign
EGUIDE: Download this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

GearsDesign

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Hedge Funds: Why Comply? - A Practical Guide to Developing a Culture of Compliance
sponsored by Advent Software, Inc
WHITE PAPER: This white paper written by Advent Software outlines how hedge funds can create a "culture of compliance" with best practice ideas for accurate record keeping and reporting, transparency in operations and, putting the interests of investors first.
Posted: 10 Jul 2008 | Published: 01 Jan 2006

Advent Software, Inc

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence

Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos

Technology Tools and Policies for Corporate Compliance
sponsored by TechTarget Security
EBOOK: In this SearchCompliance e-book, examine the technology tools and policies organizations are implementing as part of a wide-ranging corporate compliance program.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

TechTarget Security