Sarbanes Oxley Compliant Webinar SoftwareWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Sarbanes Oxley Compliant Webinar Software returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Security Policies
 •   Records Management
 •   Vulnerability Assessment
 •   Treasury / Cash / Risk Management
 •   Access Control
 •   Enterprise Financial Management Solutions

Related Searches
 •   Active Sarbanes
 •   Consults Sarbanes Oxley Compliant
 •   Definition Sarbanes
 •   Email Sarbanes
 •   Papers Sarbanes
 •   Sarbanes Oxley Compliant Advertising
 •   Sarbanes Oxley Compliant Mac
 •   Sarbanes Oxley Compliant Timeline
 •   Sarbanes Oxley Examples
 •   Sarbanes Oxley Improvement
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Closed-loop Records Management: The Stakes Are Too High to Ignore by RSD

February 15, 2012 - (Free Research)
As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance. 
(WHITE PAPER) READ ABSTRACT |

RSA SecurID extension for the IBM System i by Safestone Technologies

October 27, 2010 - (Free Research)
White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment. 
(WHITE PAPER) READ ABSTRACT |

CW buyer’s guide: managing identity & access by ComputerWeekly.com

August 16, 2013 - (Free Research)
This 10-page buyer's guide to identity and access mangaement looks at how to make the most of an employee's own digital identity, how to maintain productivity, and how to find a balance between the needs of the business and regulators. 
(ESSENTIAL GUIDE) READ ABSTRACT |

DATA ARCHIVING : The first Step toward Managing the Information Lifecycle by Dolphin

October 19, 2009 - (Free Research)
This whitepaper discusses the business case for data archiving as the first step in an SAP ILM strategy; strategies for Data Archiving, Retention Management and the Retention Warehouse strategy for legacy decommissioning in SAP; and Dolphin's best‐practices approach to an effective, long‐term ILM strategy. 
(WHITE PAPER) READ ABSTRACT |

Why Should Companies Take a Closer Look at Business Continuity Planning? by Datalink

May 26, 2010 - (Free Research)
Over the last 30 years, companies have significantly changed their approach to ensuring that their businesses can continue to run in the event of a catastrophe. Read this white paper to learn how business continuity and disaster recovery solutions can help you to develop a more robust enterprise. 
(WHITE PAPER) READ ABSTRACT |

Five Procurement Guidelines You Can't Afford to Ignore by StarCite

August 2008 - (Free Research)
Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination. 
(WHITE PAPER) READ ABSTRACT |

Backup Express and NetApp: A Better Backup and Recovery Solution by Syncsort

August 2008 - (Free Research)
The new technology which fulfills the ambitious goal combines the benefits of disk-based backup, continuous blocklevel incremental backup, synthesized virtual base and file-level restore. 
(WHITE PAPER) READ ABSTRACT |

The Top Six Risks of Employee Internet Use and How to Stop Them by St. Bernard Software

May 2010 - (Free Research)
Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Intacct Financial Management and Accounting System: Product Brochure by Intacct Corporation

March 2010 - (Free Research)
This brochure presents an in-depth look at Intacct’s financial management and accounting sytem and describes all the applications, features, and benefits that come with the system. Continue reading to learn more about Intacct’s financial management and accounting solutions in the cloud. 
(BROCHURE) READ ABSTRACT |

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs by Tripwire, Inc.

January 2008 - (Free Research)
To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

The Top 10 Reasons to Automate Your AP Processes by Kofax, Inc.

September 2010 - (Free Research)
This white paper examines in detail the relevant issues and benefits of Accounts Payable (AP) transformation as well as recent industry-wide research and best practices around such initiatives. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Steps to Protecting Your Organization’s Privacy Data by McAfee, Inc.

March 2010 - (Free Research)
Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All? by Dell Software

July 2010 - (Free Research)
Learn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance. 
(WHITE PAPER) READ ABSTRACT |

SAP GRC Access Control Solution by HCL Technologies Ltd.

May 2008 - (Free Research)
This white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver by Security Weaver

November 2010 - (Free Research)
In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit. 
(CASE STUDY) READ ABSTRACT |

PCI Compliant Yesterday. Still Compliant Today? by Tripwire, Inc.

January 2010 - (Free Research)
This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more. 
(WEBCAST) READ ABSTRACT |

Bruce Silver & Associates: A Practical Approach to Enterprise Records Management by EMC Corporation

August 2008 - (Free Research)
Enterprise records management (ERM) is an important initiative for many organizations today. Learn about the diversity of records management requirements at the enterprise level and why other solutions fail to meet these requirements. 
(WHITE PAPER) READ ABSTRACT |

The Lowdown on Compliant Data Storage by Iron Mountain

March 2012 - (Free Research)
Check out this white paper for 10 keys to staying compliant. Learn about the importance of access and authorization controls, discover the benefits of encryption for backups, learn how to safeguard traveling media and more. 
(WHITE PAPER) READ ABSTRACT |

The Decision Maker's Guide to Compliant Records Management by Iron Mountain

April 2012 - (Free Research)
This expert e-guide reviews the resources and characteristics you need to ensure your records management strategy is up to par. Gain insights on how to achieve compliance goals, develop your policy, determine costs and evaluate vendors. 
(EGUIDE) READ ABSTRACT |

Compliant Statement Archiving and Presentment for Financial Services by EMC Corporation

September 2008 - (Free Research)
Read this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements. 
(WHITE PAPER) READ ABSTRACT |

Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks by OpenText

April 2012 - (Free Research)
This white paper explores the potential compliance related benefits to adopting fax server technology. 
(WHITE PAPER) READ ABSTRACT |

WagerWorks Takes Fraudsters Out of the Game Using iovation Device Reputation by iovation, Inc.

December 2009 - (Free Research)
In this paper WagerWorks covers how to deal with fraud challenges and resolution requirements of the casino industry. 
(CASE STUDY) READ ABSTRACT |

LogRhythm and PCI Compliance by LogRhythm, Inc.

September 2009 - (Free Research)
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts