Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Compliance (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Compliance (Security)White Papers (View All Report Types)
 
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Central Reporting Tool: Streamline Compliance Reporting
sponsored by APTARE
WHITE PAPER: Uncover key compliance requirements you should address in your backup strategy and learn how a central reporting tool can help you streamline compliance reporting, ensure data is protected throughout its entire lifecycle, and produce reports to quickly and accurately demonstrate compliance.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

Following the Rules, Reducing the Risk
sponsored by IBM
WHITE PAPER: This white paper discusses strategies for the often daunting challenge of meeting compliance requirements, including how to get your business' records in order, select technology to help with the task of information governance, and more.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

IBM

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Resolving the Catch-22 of UC&C in Regulated Environments
sponsored by Dimension Data
WHITE PAPER: This white paper explains why organizations in regulated sectors like finance, government, and healthcare have a different set of requirements for cloud-based unified communications and collaboration services, and introduces a suite of email and collaboration tools that meets these needs.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dimension Data

5 Cornerstones of Compliance
sponsored by Datto, Inc.
WHITE PAPER: This resource highlights the 5 cornerstones of compliance and gives you the facts on a security strategy designed to meet a diverse set of MSP needs.
Posted: 16 May 2014 | Published: 31 Dec 2013

Datto, Inc.

Privacy, Security, and Compliance: What You Don't Know Might Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA, The Security Division of EMC
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA, The Security Division of EMC

Reducing the costs and risks of data storage in the federal government
sponsored by IBM
WHITE PAPER: This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
Posted: 29 Oct 2013 | Published: 30 Jun 2012

IBM

The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate
sponsored by Attachmate Corporation
WHITE PAPER: Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution.
Posted: 09 Apr 2013 | Published: 29 May 2009

Attachmate Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement