Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Security Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Security ComplianceMultimedia (View All Report Types)
 
10 Tips for Securing your Email
sponsored by Symantec Hosted Services
WEBCAST: Attend this SearchSMB.com Expert Webcast to learn 10 tips that will help small to medium-sized businesses (SMBs) protect their corporate email servers.
Posted: 30 Oct 2006 | Premiered: Nov 1, 2006, 13:00 EST (18:00 GMT)

Symantec Hosted Services

Test and simulate rules using WebSphere ILOG Business Rules Management System
sponsored by IBM
PRODUCT DEMO: Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Posted: 12 Dec 2010 | Premiered: 12 Dec 2010

IBM

Flash: Maximo Asset Management for Healthcare Organizations
sponsored by IBM
VIDEO: This brief video describes an asset management tool that can help you meet the challenges of an evolving healthcare landscape. Tune in to learn how you can increase productivity and asset utilization, manage compliance, lower costs, and more.
Posted: 05 Nov 2013 | Premiered: 05 Nov 2013

IBM

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

IBM Information Lifecycle Management in Regulated Industries
sponsored by IBM
WEBCAST: Attend this Webcast, and listen as IDC's Research Director, Laura DuBois, discusses the issues around identifying and classifying information.
Posted: 18 Oct 2006 | Premiered: Nov 1, 2006, 13:00 EST (18:00 GMT)

IBM

The Lurking eDiscovery Disaster 
sponsored by Workshare
PODCAST: New eDiscovery rules are forcing organizations to develop policies and actions to comply with civil litigation today.
Posted: 14 Sep 2007 | Premiered: Sep 14, 2007, 09:00 EDT (13:00 GMT)

Workshare

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

Preparing For Email and File Archiving Best Practices
sponsored by Proofpoint, Inc.
VIDEO: Learn how to get started on building a business case for deployment, preparing your organizations' employees and understanding the new federal rules of civil procedure.
Posted: 16 Jan 2009 | Premiered: 15 Jan 2009

Proofpoint, Inc.

Exchange Server 2007 Replication Strategies
sponsored by Dell | EMC
WEBCAST: Please join your hosts from Dell/EMC for a discussion of Exchange 2007 benefits and see which replication method and system design best suits your organization.
Posted: 23 Apr 2007 | Premiered: Apr 25, 2007, 09:00 EDT (13:00 GMT)

Dell | EMC

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement