Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Security Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Security Compliance White Papers (View All Report Types)
A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper can help you easily focus your security on your most sensitive data by providing guidelines to effective data classification.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009


A Practical Approach to Authentication in an Evolving Enterprise Environment
sponsored by Entrust, Inc.
WHITE PAPER: View this white paper to explore how to find the balance between compliance, remote workers, and reducing costs, top authentication methods, key condiserations for enterprise authentication, and more. 
Posted: 22 Aug 2011 | Published: 17 Aug 2011

Entrust, Inc.

Leveraging XBRL for Value in Organizations
sponsored by ISACA
WHITE PAPER: This white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included.
Posted: 18 Aug 2011 | Published: 18 Aug 2011


The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013


Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Data Center Designs to Help Meet Your Compliance Challenge
sponsored by Iron Mountain
WHITE PAPER: This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013


Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013


Building Your Business Case for Managed File Transfer
sponsored by OpenText
WHITE PAPER: The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement