Search the Library
 
Home >

Security

>

Compliance


Results 1 - 25 of 247 matches Sort Results By : Published Date | Title | Company name
Protecting Sensitive Information in an Increasingly Leaky World
By : Trend Micro, Inc. Published Date: Mar 17, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Download Now
Trend Micro, Inc.
Best Practices in Data Governance (Video)
By : IBM Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Download Now
IBM
Email Archiving & Compliance Solutions for mid-sized organizations
By : IBM Published Date: Mar 10, 2009
Small and Mid-market customers struggle to meet ever mounting e-mail archiving requirements and associated compliance demands - often with a limited I/T staff and within strict budgetary guidelines. Compliance requires eMail to be retained more stringently and for longer periods of time - fueling existing challenges of eMail management. Learn more today!

Download Now
IBM
Free Whitepaper: Should Your E-Mail Live in the Cloud?
By : Dell. Published Date: Jan 05, 2009
Download this free whitepaper from Dell for a complete discussion of the important issues surrounding cloud-based e-mail. Learn more today!

Download Now
Dell.
Free Whitepaper: Essentials of Software Asset Management
By : Dell. Published Date: Nov 04, 2008
Businesses need to keep up with user demand for software, and check licensing requirements when implementing new applications. Compliance issues can easily arise without proper monitoring. Download this free guide for a complete set of best policies and practices for software asset management. Learn more today!

Download Now
Dell.
Change Management: Reduce the Chaos by Taking Control
By : Numara Software Published Date: Jul 08, 2009
This webinar will discuss the challenges in designing a workable change management process, defining approval workflows, and conforming to IT governances such as Sarbanes-Oxley and SAS70. This webinar will also show you how quickly Numara FootPrints Change Management can help you effectively and easily manage change, ensure compliance in IT, as well as other functional areas of your business. Learn more today!

Download Now
Numara Software
Maximize ROI with Email Security in the Cloud.
By : Proofpoint Published Date: Jun 22, 2009
Email: It’s your most important business communication tool, but also the most risky. Increasing mail volumes and larger attachments drive the need for more mail servers, more storage and more resources to manage them. And concerns about confidentiality, compliance and data privacy are putting increased focus on outbound email. Meanwhile, the time and costs required to manage email are chipping away at your IT budget. But advances in cloud computing and SaaS hold the key to maximizing your ROI, while providing the anti-spam, anti-virus, DLP, archiving and encryption features you need to meet today’s email security challenges. Learn how “in the cloud” email security solutions can greatly reduce up-front investments, minimize ongoing administration costs and minimize time-to-value.
Download Now
Proofpoint
Using Symark PowerBroker to Enrich Your Organization’s RBAC Model
By : Symark International, Inc. Published Date: Jun 17, 2009
The essential notion of Role-Based Access Control (RBAC) for IT security administration is establishing permissions based on the functional roles within the enterprise, and then assigning users to a role or set of roles.
Download Now
Symark International, Inc.
PCI DSS Compliance in the UNIX/Linux Datacenter Environment
By : Symark International, Inc. Published Date: May 20, 2009
This whitepaper discusses how creating a secure access control infrastructure in heterogeneous Unix/Linux environments supports the Payment Card Industry Data Security Standard (PCI DSS).  Symark PowerBroker controls access to systems and cardholder data, and creates comprehensive logs and audit trails.  Various tables show PowerBroker’s functionality mapped to the PCI DSS requirements.
Download Now
Symark International, Inc.
Maximizing the Value of Economic Stimulus Funds
By : SAP Published Date: May 05, 2009
Learn how to meet the challenges facing your agency with respect to the recent stimulus plan.

Download Now
SAP
Guide to IT Search: Managing the Modern Data Center
By : Splunk Inc. Published Date: Apr 14, 2009
This document explains IT Search's ability to instantly search all the data generated by applications, servers and network devices in your IT infrastructure. Download to learn more today!

Download Now
Splunk Inc.
IT Silos Are Hurting Your Company: Make IT Data a Strategic Asset
By : Splunk Inc. Published Date: Apr 14, 2009
According to Forrester, organizations spent $1.5 trillion globally managing IT last year. 75% of this was spent on silos, legacy systems that still don't get answers to the most important questions: troubleshooting outages, investigating security incidents, and demonstrating compliance. Learn about the innovative software product forward-thinking organizations are using to dramatically improve their productivity and change the way they manage and secure IT.
Download Now
Splunk Inc.
Demystifying Compliance
By : Splunk Inc. Published Date: Apr 14, 2009
Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.
Download Now
Splunk Inc.
Operational Excellence: The New Lever for Profitability and Competitive Advantage
By : SAP Published Date: Jan 14, 2009
In this paper, we provide an overview on the importance of achieving operational excellence in the current economy and how to link strategy to operations as described by Drs. Kaplan & Norton in their new book The Execution Premium.
Download Now
SAP
When the Going Gets Tough, Good Institutions Get Even Tougher on Ensuring Reg
By : Tripwire Published Date: Dec 29, 2008
Learn the 5 core competencies of compliance and how to institute an automated compliance solution.
Download Now
Tripwire
Laws, regulations and compliance: Top tips for keeping your data under your control
By : Sophos Published Date: Dec 12, 2008
The challenge of complying with a growing number of frequently changing government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Download Now
Sophos
Top five strategies for combating modern threats: is anti-virus dead?
By : Sophos Published Date: Oct 17, 2008
Today’s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce. Organizations need innovative approaches to protect the web, email servers and endpoint. This paper discusses the security implications of modern threats, analyzes where emerging technologies can add real value, and highlights five key strategies for ensuring solid malware protection.

Download Now
Sophos
Unraveling GLBA: Compliance Basics for Managers, Officers and Directors of Financial Institutions
By : Tripwire Published Date: Sep 11, 2008
Learn about the financial institution safeguards included in the Gramm-Leach-Bliley Act (GLBA) and how your organization can institute an orderly set of compliance steps using an automated configuration audit and control solution.
Download Now
Tripwire
Sustaining SOX Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
By : Tripwire Published Date: Sep 11, 2008
Since the adoption of SOX, much has been learned about IT compliance. Discover how to make SOX efforts more effective in "Sustaining Sox Compliance."
Download Now
Tripwire
Basel II Compliance with Tripwire
By : Tripwire Published Date: Sep 10, 2008
Understand the issues addressed by the new international banking standard known as the Basel Committee on Banking Supervision (BCBS or Basel II), and find out how Tripwire can help meet all requirements of Basel II compliance even before it becomes a worldwide banking regulation.
Download Now
Tripwire
MiFID Compliance With Tripwire
By : Tripwire Published Date: Sep 10, 2008
Understand the compliance requirements of the European Union's Markets in Financial Instruments Directive (MiFiD), and how controlling IT change addresses many of those requirements.
Download Now
Tripwire
Global Best Practices in Email Security, Privacy and Compliance.
By : Proofpoint Published Date: Aug 08, 2008
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations worldwide. Securing inbound email - while challenging enough - is less difficult than maintaining compliance with the complex, overlapping and sometimes conflicting global regulations that govern data privacy, transactional ethics and corporate governance. Learn more today!

Download Now
Proofpoint
The CIO Wish List: 7 Steps to Mission Critical IT Services
By : Stratus Technologies Published Date: Jul 17, 2008
CIOs today are being called upon to interpret business strategy and priorities, then add value through information technology initiatives. At a time when "critical to the business" translates to "mission-critical IT", how do you ensure end-to-end availability and reliability of the IT resources that enable your company’s essential business processes.
Download Now
Stratus Technologies
Email Archiving - Understanding the Reasons, Risks & Rewards
By : Proofpoint Published Date: Jun 23, 2008
Statistics show that as much as 60 percent of business-critical data now resides in email, making it the most important repository of data your company may own. This huge amount of data translates into a significant burden on corporate storage resources. These facts - combined with a recent onslaught of regulatory compliance rules - are forcing organizations to take a deeper look at email storage, retention, and archiving practices. Learn more today!
Download Now
Proofpoint
No More FTP: Eliminate FTP and Email Attachment Issues.
By : Proofpoint Published Date: May 14, 2008
Today's business environment requires ad hoc and instantaneous sharing of information. Systems for sending large files have not kept pace with the needs of today's enterprise, where increasingly large and sophisticated business documents, files and media need to be quickly transmitted and shared with coworkers, business partners and customers around the world. Learn more today!
Download Now
Proofpoint
 
Results 1 - 25 of 247 matches Sort Results By : Published Date | Title | Company name
Home >

Security

>

Compliance

<< Start < Previous 1 2 3 4 5 6 7 8 9 10 Next > End >>

More Security Topics

Access Control

,

Anti Spam

,

Anti Spyware

,

Anti Virus

,

Application Security

,

Auditing

,

Authentication

,

Biometrics

,

Business Continuity

,

Compliance

,

DDoS

,

Disaster Recovery

,

Email Security

,

Encryption

,

Firewalls

,

Hacker Detection

,

High Availability

,

Identity Management

,

Internet Security

,

Intrusion Detection

,

Intrusion Prevention

,

IPSec

,

Network Security Appliance

,

Password Management

,

Patch Management

,

Phishing

,

PKI

,

Policy Based Management

,

Security Management

,

Security Policies

,

Single Sign On

,

SSL

,

Secure Instant Messaging

,

Web Service Security

,

Vulnerability Management

SUBSCRIBE FORM
Receive an email alert whenever new research is added into:
Compliance
Enter your email below:

RELATED TOPICS
Backup And Recovery
101 Documents
Best Practices
197 Documents
Corporate Governance
24 Documents
Data Management
297 Documents
Document Management
69 Documents
HIPAA Compliance
68 Documents
IT Management
359 Documents
ITIL
59 Documents
Information Management
124 Documents
Records Management
39 Documents
Sarbanes Oxley Compliance
77 Documents
Security
461 Documents
Software Compliance
33 Documents

Search the Library
White Papers powered by
   Compliance White Papers
   Learn about White Paper Lead Generation opportunities
Quick Links
Ziff Davis Media