Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Compliance (Security)

RSS Feed    Add to Google    Add to My Yahoo!
Compliance (Security) Reports
 
Maximizing Profitability and Customer Service in Banking with Automated Financial Transactions
sponsored by IBM
ANALYST REPORT: Access this report today to learn how a single, central, open architecture solution that integrates disparate systems can improve financial institutions' profit margins, compliance, and customer satisfaction.
Posted: 26 Jan 2015 | Published: 21 Jul 2014

IBM

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

Meet the N-able product family
sponsored by Solarwinds N-able
VIDEO: This video to gives you a brief overview of the N-central platform and capabilities. You'll also learn about the powerful modules that make this the leading RMM and MSP automation solution.
Posted: 23 Sep 2014 | Premiered: 08 Apr 2014

Solarwinds N-able

After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013

SearchSecurity.com

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

How Web Security Improves Productivity and Compliance
sponsored by Webroot
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 30 May 2013 | Published: 31 Dec 2012

Webroot

PhoneFactor Case Study: Fredrikson & Byron, P.A.
sponsored by PhoneFactor
CASE STUDY: Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

PhoneFactor

Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution
sponsored by RSA
PRODUCT LITERATURE: SEA is a comprehensive email archiving solution from Sunbelt Software that effectively addresses today's corporate email communication needs.
Posted: 17 Feb 2014 | Published: 29 Aug 2008

RSA

October 2013 Health IT E-Zine
sponsored by SearchHealthIT.com
EZINE: In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

SearchHealthIT.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement