Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Compliance (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Compliance (Security)Reports
 
Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

An IT Auditor’s Guide to Security Controls & Risk Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource details a simpler, more effective approach to compliance that aims to help your enterprise to meet Governance, Risk, and Compliance standards, while managing the systems, files, and user permissions that you need to meet the needs of your organization.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Bit9, Inc.

Barium Ferrite: The storage media of the future is here today
sponsored by Barium Ferrite
WHITE PAPER: This whitepaper examines BaFe technology and standard Metal Particle (MP) technology to provide comparisons between the two and explain the benefits of BaFe media. It will also explain the reasons for the stability and reliability of BaFe technology that serve as the basis for its use in solutions
Posted: 17 Mar 2014 | Published: 31 Dec 2013

Barium Ferrite

Report Helps Healthcare IT Execs Navigate the Cloud
sponsored by Insight
WHITE PAPER: This white paper summarizes a recent report from the Institute for Health Technology Transformation that addressed the state of cloud computing within the healthcare industry.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Insight

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Vulnerability Management and Risk Assessment for the Cybersecurity Framework
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes one company's scalable, targeted approach to helping organizations meet the vulnerability and compliance requirements set by the NIST's Cybersecurity Framework.
Posted: 11 Nov 2014 | Published: 24 Feb 2014

Tenable Network Security

Nasty Shadow IT Surprises for the Enterprise
sponsored by CipherCloud
RESOURCE: Check out this resource to learn about three shadow IT surprises that are capable of affecting your business.
Posted: 01 Oct 2014 | Published: 08 Sep 2014

CipherCloud

A Positive Security Approach to PCI DSS 3.0 Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource sets out a roadmap to meeting the requirements of PCI DSS 3.0, helping you to break each step of the process down into manageable, easy-to-understand components.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Bit9, Inc.

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement