Section 404 Reports

Webinar: Practical Examples for Achieving and Maintaining DevOps Compliance for Financial Institutions
sponsored by WANdisco
WEBCAST: Banking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.
Posted: 23 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

File Archive: the next big thing?
sponsored by EMC Corporation
VIDEO: Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.
Posted: 08 Oct 2013 | Premiered: 08 Oct 2013

EMC Corporation

CollabNet Success Story: Agile CMMI
sponsored by CollabNet
CASE STUDY: Facing pressure to deliver solutions quickly and meet rapidly changing priorities, investment banks are reluctant to change processes and adopt new tools. Learn how CollabNet enabled software development/change management process that would enable CMMI compliance while accommodating existing Agile development practices used by various teams.
Posted: 06 Jan 2010 | Published: 06 Jan 2010

CollabNet

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Two Sides of the Same Coin: The Convergence of Security and Compliance
sponsored by Imperva.
WHITE PAPER: Security and compliance issue will continue to dominate IT initiations as long as valuable on customer, employees, patients and business financials is exchanged and stored.
Posted: 08 Oct 2008 | Published: 08 Oct 2008

Imperva.

Revamping and optimizing your SAP GRC strategy
sponsored by Security Weaver
EBOOK: GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Case Study: Fortune 100 Insurance Company and Security Weaver
sponsored by Security Weaver
CASE STUDY: For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

2013 Data Governance Survey Results
sponsored by Rand Secure Data
WHITE PAPER: Check out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.
Posted: 10 Mar 2014 | Published: 09 Oct 2013

Rand Secure Data

E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE: While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010

ArcSight, an HP Company