Compliance Management Software Reports

Financial markets regulatory outlook 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 08 Feb 2021 | Published: 20 Jan 2017

TechTarget ComputerWeekly.com

Infographic: Gartner AI and compliance spending forecast
sponsored by TechTarget ComputerWeekly.com
EGUIDE: More than 60 jurisdictions around the world have proposed or are drafting postmodern privacy and data protection laws as a result. This infographic shows Gartner AI and compliance spending forecast.
Posted: 08 Feb 2021 | Published: 25 Feb 2020

TechTarget ComputerWeekly.com

The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 31 Aug 2011 | Published: 30 Aug 2011

Dell Software

Tips to Develop the Right Retention Schedule for your Organization
sponsored by TechTarget CIO
EBOOK: Check in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

TechTarget CIO

The Unstructured Data Extinction: Automated Governance in the Digital Age
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT: Rapidly advancing technology is forcing big changes to companies' GRC practices. In this classroom, learn how modern technology is forcing companies to develop automated governance features to help ensure corporate data stays compliant and secure.
Posted: 02 Feb 2016 | Premiered: 02 Feb 2016

TechTarget Security

Case Study: WebEx - Securing Web Collaboration
sponsored by Qualys
CASE STUDY: Read this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
Posted: 18 May 2010 | Published: 18 May 2010

Qualys

Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
sponsored by Mainline Information Systems
PRESENTATION TRANSCRIPT: This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
Posted: 17 Jun 2011 | Published: 16 Jun 2011

Mainline Information Systems

E-Book: NERC Compliance
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

TechTarget Security

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM