Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Section 404

RSS Feed    Add to Google    Add to My Yahoo!
Section 404 White Papers (View All Report Types)
4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams
sponsored by Qualys, Inc.
WHITE PAPER: This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Qualys, Inc.

Why Managing Mobility Matters
sponsored by SAP America, Inc.
WHITE PAPER: Mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Posted: 05 Jan 2011 | Published: 05 Jan 2011

SAP America, Inc.

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005


Document Solutions IP Faxing versus Conventional Faxing: A Critical Analysis
sponsored by Premiere Global Services
WHITE PAPER: This white paper uses examples in three industries with the heaviest fax usage - finance, healthcare, and insurance - to demonstrate costs and risks that are shared across all industries.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Premiere Global Services

The Business Case for Data Security
sponsored by Imperva
WHITE PAPER: This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
Posted: 16 Nov 2010 | Published: 16 Nov 2010


Identity Management: The Foundation for PCI, SOX, and HIPAA Compliance
sponsored by Watson SCS, Inc.
WHITE PAPER: This paper discusses the inner-workings of an identity management solution and how it relates to SOX, PCI and HIPAA compliance.
Posted: 01 Dec 2007 | Published: 01 Nov 2007

Watson SCS, Inc.

The Case for Contract Management -- Why You Should Get Started Today
sponsored by SAP America, Inc.
WHITE PAPER: How well-versed are you in the three key areas of contract lifecycle management (CLM) that will give you the visibility to control your contracts and comply with regulations? Take this quick quiz to determine your contract competency and understand whether a CLM solution would benefit your organization.
Posted: 27 Apr 2012 | Published: 30 Jun 2011

SAP America, Inc.

How the Guardium Platform Helped Dell IT Simplify Enterprise Security
sponsored by Guardium, an IBM Company
WHITE PAPER: Safeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.
Posted: 10 Aug 2010 | Published: 10 Aug 2010

Guardium, an IBM Company

DATA ARCHIVING : The first Step toward Managing the Information Lifecycle
sponsored by Dolphin
WHITE PAPER: This whitepaper discusses the business case for data archiving as the first step in an SAP ILM strategy; strategies for Data Archiving, Retention Management and the Retention Warehouse strategy for legacy decommissioning in SAP; and Dolphin's best‐practices approach to an effective, long‐term ILM strategy.
Posted: 19 Oct 2009 | Published: 19 Oct 2009


End-to-End Enterprise Compliance, Provisioning and Role Enforcement: With Sun Java™ System Identity Manager and SAP GRC Access Control
sponsored by Sun Microsystems, Inc.
WHITE PAPER: This white paper describes how a complete end-to-end IAM solution can be configured after exploiting the benefits of the integrated product stack.
Posted: 03 Jul 2008 | Published: 01 Jun 2008

Sun Microsystems, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement