Financial Compliance Software Reports

Managing Customer Data in the GDPR Era
sponsored by GearsDesign
EGUIDE: Download this expert guide to learn more about why enterprises need to train agents on how to properly process incoming customer requests to delete or reduce customer data, while maintaining GDPR compliance.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

GearsDesign

Preparing for Personal Data Privacy Policies
sponsored by Micro Focus
EGUIDE: As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.
Posted: 12 Jul 2019 | Published: 10 Jul 2019

Micro Focus

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

State of GDPR in mainland Europe
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

TechTarget ComputerWeekly.com

Collab Net Success Story
sponsored by CollabNet
CASE STUDY: Discover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

CollabNet

Symantec IT Compliance Solution
sponsored by Symantec Corporation
PRODUCT LITERATURE: Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company
sponsored by IBM
CASE STUDY: InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

IBM

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

The Unstructured Data Extinction: Automated Governance in the Digital Age
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT: Rapidly advancing technology is forcing big changes to companies' GRC practices. In this classroom, learn how modern technology is forcing companies to develop automated governance features to help ensure corporate data stays compliant and secure.
Posted: 02 Feb 2016 | Premiered: 02 Feb 2016

TechTarget Security