Section 404 Reports

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
sponsored by BWise
EGUIDE: This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

BWise

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

Thomas & King Case Study: The Right Ingredients for Software Asset Management
sponsored by Dell, Inc. and Intel®
CASE STUDY: Read this Dell case study to learn how a restaurant franchisee gets its IT cooking with the right reporting from Dell Software Inventory & Usage Management.
Posted: 07 Oct 2009 | Published: 01 Oct 2008

Dell, Inc. and Intel®

Oracle Financial Analytics
sponsored by Oracle Corporation
DATA SHEET: Oracle Financial Analytics provides organizations with better visibility into factors that drive revenues and shareholder value. Oracle BI Applications are powerful, pre-built solutions that enable organizations to implement more quickly, with less risk and at a fraction of the cost required to build traditional business intelligence solutions.
Posted: 11 Sep 2009 | Published: 01 Dec 2008

Oracle Corporation

Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt
sponsored by BigFix
PRESENTATION TRANSCRIPT: In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.
Posted: 02 Nov 2010 | Published: 01 Nov 2010

BigFix

SenSage Event Data Warehouse
sponsored by Hexis Cyber Solutions Inc
PRODUCT LITERATURE: This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more.
Posted: 01 Aug 2008 | Published: 01 Aug 2008

Hexis Cyber Solutions Inc

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.
Posted: 09 Dec 2009 | Published: 08 Dec 2009

Novell, Inc.

Revamping and optimizing your SAP GRC strategy
sponsored by Security Weaver
EBOOK: GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Profiting from PCI Compliance
sponsored by IBM
WHITE PAPER: This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
Posted: 13 Mar 2009 | Published: 01 Sep 2007

IBM

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.