Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Legal Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Legal Compliance White Papers (View All Report Types)
 
IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite
sponsored by IBM
WHITE PAPER: Discover how the IBM Security zSecure suite contains the components you need to manage your mainframe, monitor for threats, audit usage and configurations, and enforce policies to ensure compliance.
Posted: 08 Mar 2013 | Published: 31 Aug 2011

IBM

The Impact of New Communications in the Energy Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the use of instant messaging technology in the energy industry, explaining why monitoring, logging, and archiving these communications is a necessity for achieving compliance and protecting critical assets from cyberattacks.
Posted: 16 Feb 2015 | Published: 30 May 2014

Actiance

Assessing Your Cloud Backup Opportunity: A guide to addressing 7 key questions about your customers
sponsored by Asigra
WHITE PAPER: This resource details seven questions and discussion points you should consider before integrating cloud backup into your service offerings.
Posted: 18 Apr 2012 | Published: 30 Dec 2011

Asigra

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

E-Guide: Securing the cloud
sponsored by CA Technologies.
WHITE PAPER: The cloud has become a very popular way to cut costs and get ahead but the need for security standards is increasing at a rapid pace. Individuals all over, in diverse areas of business want to know that their information will/can be safe in the cloud. Read this expert E-Guide to gain an understanding for a necessary security standard in the cloud.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

CA Technologies.

The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate
sponsored by Attachmate Corporation
WHITE PAPER: Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution.
Posted: 09 Apr 2013 | Published: 29 May 2009

Attachmate Corporation

Compliance Driven Security
sponsored by Dell, Inc.
WHITE PAPER: With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement