IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC)White Papers (View All Report Types)
1 - 25 of 132 Matches Previous Page  | Next Page
Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Compliance for Cloud Environments Simplified
sponsored by CloudPassage
WHITE PAPER: This white paper introduces Halo, which automates security controls for compliance without compromising cloud efficiency.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Identity and Access Intelligence: How Big Data and Risk Analytics Will Revolutionize IAM
sponsored by Courion Corporation
WHITE PAPER: This white paper discusses the shortcoming of today's IAM systems and gives an overview of Identity and Access Intelligence Systems.
Posted: 25 Nov 2014 | Published: 30 Sep 2013

Courion Corporation

Report Helps Healthcare IT Execs Navigate the Cloud
sponsored by Insight
WHITE PAPER: This white paper summarizes a recent report from the Institute for Health Technology Transformation that addressed the state of cloud computing within the healthcare industry.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Insight

Scale-Out Data Lake Built on EMC Isilon - Simple, Scalable, Efficient, and Secure
sponsored by EMC Isilon
WHITE PAPER: This white paper explains why enterprise data growth is best addressed by a data lake, which consolidates storage into one single, central repository of persistent data, and describes the advantages of building a data lake based on EMC Isilon.
Posted: 24 Nov 2014 | Published: 30 Sep 2014

EMC Isilon

Mobility Tech Dossier: There's an App for That, But Is It Secure?
sponsored by Hewlett-Packard Company
WHITE PAPER: Security has eroded over the past decade as companies strive to create applications for multiple platforms by farming design and development out to subcontractors, straining the processes and governance put in place to ensure application security. Read this dossier for proven best practices to mitigate risk and embrace mobility without trepidation.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company

Overcoming the Top 7 Challenges of Backup Compliance
sponsored by APTARE
WHITE PAPER: This white paper outlines 7 top compliance challenges that companies face in implementing SOX guidelines.
Posted: 17 Nov 2014 | Published: 28 Jun 2013

APTARE

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Trends in Data Centric Security
sponsored by Intel® Services
WHITE PAPER: This white paper discusses Data Centric Security, which protects data when it is shared across multiple platforms, systems, or data centers by focusing security controls onto the data itself, rather than relying on the underlying infrastructure to keep it out of the wrong hands.
Posted: 05 Nov 2014 | Published: 14 Sep 2014

Intel® Services

Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER: Find out how adopting an Information Lifecycle Governance (ILG) approach can help you achieve success with information economics.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

IBM

Information Lifecycle Governance Requirements Kit
sponsored by IBM
WHITE PAPER: Find out what it takes to reach Level 4 maturity according to the Information Lifecycle Governance Requirements Kit.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

IBM

Best Practices -Maximizing Efficiency Through Service Automation
sponsored by FrontRange Solutions Inc.
WHITE PAPER: By automating provisioning, management, and remediation, you reduce operating costs and simplify users' information access time and process. Read on to learn the six challenges to conquer when automating existing processes and how to modernise your IT department into an innovation center.
Posted: 23 Oct 2014 | Published: 01 Oct 2014

FrontRange Solutions Inc.

Five Must-Haves for Enterprise File Sync and Share Flexibility
sponsored by Code42
WHITE PAPER: This is why it's vital to have an enterprise-grade sync and share solution in place, but what constitutes enterprise grade? Read this whitepaper for five must-haves for enterprise sync and share flexibility.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Governancy Tips for Midmarket IT Leaders
sponsored by Peak 10
WHITE PAPER: Access this resource for a guide to governance so you can maintain compliance and create business value.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Peak 10

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Resolving the Catch-22 of UC&C in Regulated Environments
sponsored by Dimension Data
WHITE PAPER: This white paper explains why organizations in regulated sectors like finance, government, and healthcare have a different set of requirements for cloud-based unified communications and collaboration services, and introduces a suite of email and collaboration tools that meets these needs.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dimension Data

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover the threats to manufacturing trade secrets—and chances are, your intellectual property is already under attack.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell
WHITE PAPER: This whitepaper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell

Meeting the Solvency II Operational Risk Challenge
sponsored by IBM
WHITE PAPER: In this white paper, discover why insurance companies need to have an efficient risk management framework that assesses all internal and external risks.
Posted: 18 Sep 2014 | Published: 31 Dec 2012

IBM

Mitigating IT Risk for Financial Risk Analytics
sponsored by IBM
WHITE PAPER: This white paper explores the need for a high performance IT infrastructure to assist risk analytics.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

IBM

Log Management—The Foundation for Federal Security and Compliance
sponsored by Intel Security
WHITE PAPER: This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Intel Security
1 - 25 of 132 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement