Sarbanes-Oxley LawWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Sarbanes-Oxley Law returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Storage Management
 •   Vulnerability Assessment
 •   Treasury / Cash / Risk Management
 •   Encryption and Key Management

Related Searches
 •   Buying Sarbanes-Oxley Law
 •   Displays Sarbanes-Oxley Law
 •   Make Sarbanes-Oxley
 •   Manager Sarbanes-Oxley
 •   Sarbanes-Oxley Framework
 •   Sarbanes-Oxley Law Buys
 •   Sarbanes-Oxley Texas
 •   Sarbanes-Oxley Whitepaper
 •   Technical Sarbanes-Oxley Law
 •   Training Sarbanes-Oxley Law
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Data De-duplication and Replication Gives AIG Better Backups and Enhanced Sarbanes-Oxley Compliance by Quantum Corporation

June 2008 - (Free Research)
AIG major business challenge was the rapid access to archive data so to overcome this problem AIG tried Quantum backup solutions that combined data de-duplication disk, tape, due to which the company is now able to enhance compliance. 
(WHITE PAPER) READ ABSTRACT |

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs by Tripwire, Inc.

January 2008 - (Free Research)
To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance. 
(WHITE PAPER) READ ABSTRACT |

The Use of Labelling and Protective Marking Technologies as a Legal Defence to Data Protection Law Breaches by Boldon James

July 2011 - (Free Research)
In 2010, the United Kingdom Information Commissioner’s Office (ICO) was given authority to issue a £500,000 fine and enact spot checks on government departments as part of the Data Protection Act 1998. In this white paper, Dr. Brian Bandey, Internet and Technology Law Expert, addresses some key questions about these mandates. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley by Oversight Systems

August 2008 - (Free Research)
Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance. 
(WHITE PAPER) READ ABSTRACT |

Laws, regulations and compliance: Top tips for keeping your data under your control by Sophos, Inc.

December 2008 - (Free Research)
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution. 
(WHITE PAPER) READ ABSTRACT |

Data Protection Masterclass: New EU Data Protection Regulation by ComputerWeekly.com

September 2012 - (Free Research)
Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses. 
(PRESENTATION) READ ABSTRACT |

Data Protection Masterclass: Global Privacy by ComputerWeekly.com

May 2012 - (Free Research)
This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

5 Backup Features to Ensure Compliance by APTARE

June 2013 - (Free Research)
In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information. 
(WHITE PAPER) READ ABSTRACT |

A Guide to Email Regulatory Compliance by USA.NET, Inc.

July 2009 - (Free Research)
This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET. 
(WHITE PAPER) READ ABSTRACT |

SAP GRC Access Control Solution by HCL Technologies Ltd.

May 2008 - (Free Research)
This white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning. 
(WHITE PAPER) READ ABSTRACT |

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions by eIQnetworks

March 2009 - (Free Research)
Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more. 
(PODCAST) READ ABSTRACT |

Top Ten Essentials for Privileged Account Management by FoxT

February 2010 - (Free Research)
In this white paper, discover how you can effectively and efficiently control privileged accounts using the latest in adaptive access controls management. You will also learn about how to leverage the latest in Role-Based Access Controls. 
(WHITE PAPER) READ ABSTRACT |

Law & The Data Explosion by Symantec Corporation

September 2010 - (Free Research)
This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Information Governance Imperative by RSD

August 2009 - (Free Research)
Read this paper to learn how information governance is becoming more important in today's business world and learn why your organization needs to implement an information governance strategy today and how to go about implementing one. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Data Protection Plans for Complying with Privacy Laws by SearchSecurity.com & SearchCompliance.com

October 2010 - (Free Research)
This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more! 
(EBOOK) READ ABSTRACT |

Laws, regulations and compliance: Top tips for keeping your data under your Control by Sophos UK

December 2008 - (Free Research)
The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution. 
(WHITE PAPER) READ ABSTRACT |

Legal briefing: The Draft EU General Data Protection Regulation by ComputerWeekly.com

January 2014 - (Free Research)
This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation. 
(ESSENTIAL GUIDE) READ ABSTRACT |

HIPAA Best Practices Checklist by Iron Mountain

March 2012 - (Free Research)
This resource offers a checklist for best practices that go beyond HIPAA compliance, ensuring your health care facility remains in good standing with the law and the public. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Download: Data Protection Strategies: Data Encryption by CDW Healthcare

October 2011 - (Free Research)
If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Virtual Data Center E-Zine - Volume 24: Strategies to Manage Virtual Data Center Growth by SearchDataCenter.com

July 2010 - (Free Research)
Read this paper to learn how virtualization has been hyped as the answer for data center growth. And while consolidation can solve some of the challenges associated with running more workloads. 
(EZINE)

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts