SOX Compliance Reports

Riverbed Steelhead Product Family Data Sheet
sponsored by Riverbed Technology, Inc.
DATA SHEET: What's the Riverbed difference? Speed. Scalability. And simplicity. Discover it for yourself and get the facts about the entire family of Steelhead solutions from Riverbed. Companies of all sizes depend on the Riverbed Steelhead product family to accelerate the performance of applications over the WAN.
Posted: 31 Mar 2009 | Published: 31 Mar 2009

Riverbed Technology, Inc.

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
sponsored by BWise
EGUIDE: This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

BWise

Mortgage Company Uses DataFlux Technology to Improve Reporting, Manage Compliance
sponsored by DataFlux Corporation
CASE STUDY: Read how using DataFlux technology, this financial company implemented a data governance program, creating more complete and accurate data and drastically reducing the time needed to comply with Federal reporting regulations.
Posted: 14 Jan 2009 | Published: 14 Jan 2009

DataFlux Corporation

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011

Safestone Technologies

Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
sponsored by Security Weaver
CASE STUDY: In January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

SenSage Event Data Warehouse
sponsored by Hexis Cyber Solutions Inc
PRODUCT LITERATURE: This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more.
Posted: 01 Aug 2008 | Published: 01 Aug 2008

Hexis Cyber Solutions Inc

Webinar: Practical Examples for Achieving and Maintaining DevOps Compliance for Financial Institutions
sponsored by WANdisco
WEBCAST: Banking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.
Posted: 23 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE: While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010

ArcSight, an HP Company