Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Security Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Security ComplianceWhite Papers (View All Report Types)
 
Securing Your IT Infrastructure with SOC/NOC Collaboration
sponsored by Hewlett-Packard Company
WHITE PAPER: Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.
Posted: 19 Aug 2014 | Published: 28 Sep 2012

Hewlett-Packard Company

Protecting Digitalized Assets in Healthcare: Which Managed File Transfer Deployment Model is Right for You?
sponsored by GlobalScape
WHITE PAPER: Learn what types of policies and tools can be implemented to secure valuable healthcare data.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

GlobalScape

The Increasing Value of Data in Australia
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: This brief infographic gives survey results from 150 organizations and explores more about the impact of changes in regulations.
Posted: 19 Aug 2014 | Published: 19 Aug 2014


Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

ViaLumina Executive Brief Series: Information Governance: The Time is Now
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this white paper and find out why senior management needs to step up and implement an information governance strategy.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Hewlett-Packard Company

How Can Content-Aware Identity and Access Management Give Me the Control I Need to Confidently Move My Business forward?
sponsored by CA Technologies.
WHITE PAPER: Organization's today have their hands full trying to adhere to regulatory requirements and reduce IT risks, all while looking for innovative ways to grow their business. This paper uncovers how to gain continuous and sustainable control and compliance though IAM, while strengthening the trust and satisfaction of your customers and partners.
Posted: 16 May 2012 | Published: 01 Feb 2012

CA Technologies.

Information Classification: Delivering Security and Business Value
sponsored by Boldon James
WHITE PAPER: This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software.
Posted: 10 Oct 2011 | Published: 10 Oct 2011


Best Practices for a Successful DLP Deployment
sponsored by TITUS
WHITE PAPER: This is your guide to a successful DLP deployment including 5 best practices to ensure that your DLP solution is setup for success from the start.
Posted: 08 Nov 2011 | Published: 08 Nov 2011

TITUS

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk
sponsored by Sybase, an SAP company
WHITE PAPER: This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.
Posted: 04 Jun 2012 | Published: 30 Apr 2012

Sybase, an SAP company

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement