Compliance Management Software Reports

Technology Tools and Policies for Corporate Compliance
sponsored by TechTarget Security
EBOOK: In this SearchCompliance e-book, examine the technology tools and policies organizations are implementing as part of a wide-ranging corporate compliance program.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

TechTarget Security

Understanding E-Discovery Software Requirements
sponsored by Exterro
WHITE PAPER: This IT buyer's guide dives into eDiscovery software requirements by highlighting the capabilities commonly needed by IT teams and how a web-based legal process management software suite meets these requirements.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Exterro

Collab Net Success Story
sponsored by CollabNet
CASE STUDY: Discover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

CollabNet

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online
sponsored by TechTarget ComputerWeekly.com
EZINE: This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing.
Posted: 21 May 2012 | Published: 22 May 2012

TechTarget ComputerWeekly.com

Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act
sponsored by Absolute
CASE STUDY: This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.
Posted: 13 Nov 2013 | Published: 31 Dec 2012

Absolute

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011

Safestone Technologies

The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
sponsored by Dell Software
WHITE PAPER: In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 31 Aug 2011 | Published: 30 Aug 2011

Dell Software

The New Age of Compliance: Preparing Your Organization for a New Era of Increased Accountability and Enforcement
sponsored by Mimosa Systems
WHITE PAPER: This white paper examines the current state of regulatory compliance and the impact of non-compliance. It also addresses the current political environment and the shift in the compliance landscape and compliance enforcement for which organizations need to be prepared. Finally, it discusses some best practices that can be applied to streamline..
Posted: 06 Jul 2009 | Published: 10 Jun 2009

Mimosa Systems

IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
sponsored by IBM
PRESS RELEASE: Check out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

TechTarget Security