|
|
Results 1 - 25 of 247 matches |
Sort Results By : Published Date | Title | Company name |
|
Protecting Sensitive Information in an Increasingly Leaky World |
|
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Download Now
|
|
|
|
Best Practices in Data Governance (Video) |
By : IBM |
Published Date: Dec 30, 2008 |
|
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Download Now
|
|
|
|
Email Archiving & Compliance Solutions for mid-sized organizations |
By : IBM |
Published Date: Mar 10, 2009 |
|
Small and Mid-market customers struggle to meet ever mounting e-mail archiving requirements and associated compliance demands - often with a limited I/T staff and within strict budgetary guidelines. Compliance requires eMail to be retained more stringently and for longer periods of time - fueling existing challenges of eMail management. Learn more today!
Download Now
|
|
|
|
|
Free Whitepaper: Essentials of Software Asset Management |
By : Dell. |
Published Date: Nov 04, 2008 |
|
Businesses need to keep up with user demand for software, and check licensing requirements when implementing new applications. Compliance issues can easily arise without proper monitoring. Download this free guide for a complete set of best policies and practices for software asset management. Learn more today!
Download Now
|
|
|
|
Change Management: Reduce the Chaos by Taking Control |
|
This webinar will discuss the challenges in designing a workable change management process, defining approval workflows, and conforming to IT governances such as Sarbanes-Oxley and SAS70. This webinar will also show you how quickly Numara FootPrints Change Management can help you effectively and easily manage change, ensure compliance in IT, as well as other functional areas of your business. Learn more today!
Download Now
|
|
|
|
Maximize ROI with Email Security in the Cloud. |
|
Email: It’s your most important business communication tool, but also the most risky. Increasing mail volumes and larger attachments drive the need for more mail servers, more storage and more resources to manage them. And concerns about confidentiality, compliance and data privacy are putting increased focus on outbound email. Meanwhile, the time and costs required to manage email are chipping away at your IT budget. But advances in cloud computing and SaaS hold the key to maximizing your ROI, while providing the anti-spam, anti-virus, DLP, archiving and encryption features you need to meet today’s email security challenges. Learn how “in the cloud” email security solutions can greatly reduce up-front investments, minimize ongoing administration costs and minimize time-to-value.
Download Now
|
|
|
|
|
PCI DSS Compliance in the UNIX/Linux Datacenter Environment |
|
This whitepaper discusses how creating a secure access control infrastructure in heterogeneous Unix/Linux environments supports the Payment Card Industry Data Security Standard (PCI DSS). Symark PowerBroker controls access to systems and cardholder data, and creates comprehensive logs and audit trails. Various tables show PowerBroker’s functionality mapped to the PCI DSS requirements.
Download Now
|
|
|
|
|
|
IT Silos Are Hurting Your Company: Make IT Data a Strategic Asset |
|
According to Forrester, organizations spent $1.5 trillion globally managing IT last year. 75% of this was spent on silos, legacy systems that still don't get answers to the most important questions: troubleshooting outages, investigating security incidents, and demonstrating compliance. Learn about the innovative software product forward-thinking organizations are using to dramatically improve their productivity and change the way they manage and secure IT.
Download Now
|
|
|
|
Demystifying Compliance |
|
Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.
Download Now
|
|
|
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your control |
By : Sophos |
Published Date: Dec 12, 2008 |
|
The challenge of complying with a growing number of frequently changing government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Download Now
|
|
|
|
Top five strategies for combating modern threats: is anti-virus dead? |
By : Sophos |
Published Date: Oct 17, 2008 |
|
Today’s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce. Organizations need innovative approaches to protect the web, email servers and endpoint. This paper discusses the security implications of modern threats, analyzes where emerging technologies can add real value, and highlights five key strategies for ensuring solid malware protection.
Download Now
|
|
|
|
|
|
Basel II Compliance with Tripwire |
By : Tripwire |
Published Date: Sep 10, 2008 |
|
Understand the issues addressed by the new international banking standard known as the Basel Committee on Banking Supervision (BCBS or Basel II), and find out how Tripwire can help meet all requirements of Basel II compliance even before it becomes a worldwide banking regulation.
Download Now
|
|
|
|
MiFID Compliance With Tripwire |
By : Tripwire |
Published Date: Sep 10, 2008 |
|
Understand the compliance requirements of the European Union's Markets in Financial Instruments Directive (MiFiD), and how controlling IT change addresses many of those requirements.
Download Now
|
|
|
|
Global Best Practices in Email Security, Privacy and Compliance. |
|
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations worldwide. Securing inbound email - while challenging enough - is less difficult than maintaining compliance with the complex, overlapping and sometimes conflicting global regulations that govern data privacy, transactional ethics and corporate governance. Learn more today!
Download Now
|
|
|
|
The CIO Wish List: 7 Steps to Mission Critical IT Services |
|
CIOs today are being called upon to interpret business strategy and priorities, then add value through information technology initiatives. At a time when "critical to the business" translates to "mission-critical IT", how do you ensure end-to-end availability and reliability of the IT resources that enable your company’s essential business processes.
Download Now
|
|
|
|
Email Archiving - Understanding the Reasons, Risks & Rewards |
|
Statistics show that as much as 60 percent of business-critical data now resides in email, making it the most important repository of data your company may own. This huge amount of data translates into a significant burden on corporate storage resources. These facts - combined with a recent onslaught of regulatory compliance rules - are forcing organizations to take a deeper look at email storage, retention, and archiving practices. Learn more today!
Download Now
|
|
|
|
No More FTP: Eliminate FTP and Email Attachment Issues. |
|
Today's business environment requires ad hoc and instantaneous sharing of information. Systems for sending large files have not kept pace with the needs of today's enterprise, where increasingly large and sophisticated business documents, files and media need to be quickly transmitted and shared with coworkers, business partners and customers around the world. Learn more today!
Download Now
|
|
|
|
|
|
|
|
Results 1 - 25 of 247 matches |
Sort Results By : Published Date | Title | Company name |
|
<< Start < Previous 1 2 3 4 5 6 7 8 9 10 Next > End >>
|
More Security Topics |
Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, Phishing, PKI, Policy Based Management, Security Management, Security Policies, Single Sign On, SSL, Secure Instant Messaging, Web Service Security, Vulnerability Management |
|
|
|