Software  >   Applications Software  >   Enterprise Applications Software  >  

Security Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
Security Compliance Software White Papers (View All Report Types)
 
3 Step Guide for IT Governance & Compliance
sponsored by Dell Software
WHITE PAPER: This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.
Posted: 23 Feb 2015 | Published: 13 Dec 2012

Dell Software

Analyst's take: Benefits of Alpha ImageWorks 9000 for healthcare providers
sponsored by ComputerWeekly.com
WHITE PAPER: Alpha ImageWorks 9000 centralizes patient records into a single, secure repository, providing easy access, accelerated processing time and billing, and significant time saving in reviewing patient records.
Posted: 24 Oct 2011 | Published: 24 Jan 2011

ComputerWeekly.com

Shellshock: Best practices for responding to the next vulnerability or Six best practices for successful vulnerability response
sponsored by Alert Logic
WHITE PAPER: In this white paper, uncover the six steps to effective vulnerability response and how to craft your defensive strategy.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

The Ten Best Practices for Secure Software Development
sponsored by ISC2
WHITE PAPER: Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software.
Posted: 15 Dec 2010 | Published: 15 Dec 2010

ISC2

Building Compliance and Security into an Application Delivery Framework
sponsored by Citrix
WHITE PAPER: The right IT solution, such as Citrix Delivery Center™, offers a holistic approach to delivering compliance and security.
Posted: 05 May 2008 | Published: 28 Apr 2008

Citrix

Impact Brief: How to Get Started with Enterprise Risk Management
sponsored by RSA
WHITE PAPER: To implement a strategic, efficient and sustainable governance, risk and compliance (GRC) program, organizations need integrated technologies, expert resources and a unified view into business processes across IT, Finance, Operations and Legal domains.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

RSA

Understanding E-Discovery Software Requirements
sponsored by Exterro
WHITE PAPER: This IT buyer's guide dives into eDiscovery software requirements by highlighting the capabilities commonly needed by IT teams and how a web-based legal process management software suite meets these requirements.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Exterro

Using An E-Signature Solution To Save Time and Money
sponsored by Adobe EchoSign
WHITE PAPER: The following white paper explores the top 8 reasons why you should consider an e-signature solution for your organization. Learn how e-signatures can vastly improve the time to close deals, improve compliance, save capital, and much more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Adobe EchoSign

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement