Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Compliance (Law)

RSS Feed    Add to Google    Add to My Yahoo!
Compliance (Law) Reports
 
Weighing the Risks, Challenges and Benefits Before Diving into BYOD
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!
Posted: 22 Mar 2013 | Published: 22 Mar 2013

SearchSecurity.com

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by Commvault
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Commvault

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Welcome to Iron Mountain’s National Data Center
sponsored by Iron Mountain
WEBCAST: This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.
Posted: 27 Jan 2014 | Premiered: Jan 27, 2014

Iron Mountain

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
sponsored by IBM and SI Architects
EGUIDE: In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett Packard Enterprise
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett Packard Enterprise

Novartis AG Success Story: How Novartis Increased Disposition Capabilities Ten-fold
sponsored by IBM
VIDEO: One of the top expenses of healthcare company Novartis is over-retention of records. This case study details the data retention solution they adopted that helped them improve their records management strategy. View now to learn more!
Posted: 26 Jul 2013 | Premiered: 26 Jul 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement