Compliance (Systems Operations) Reports

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett Packard Enterprise
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett Packard Enterprise

Electronic discovery management in the age of big data
sponsored by TechTarget Security
EBOOK: Electronic discovery management can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

TechTarget Security

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

What to Look For In a Backup Solution to Deliver Improved Business Continuity
sponsored by Datto, Inc.
WHITE PAPER: This expert guide provides tips on building a holistic backup solution that protects your business from potentially devastating downtime, no matter what the cause. Access now to learn how you can implement a successful business continuity plan and give your enterprise a competitive edge.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Datto, Inc.

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
CASE STUDY: In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

BitGlass

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft

Accelerating Database Test and Development
sponsored by Oracle and Intel®
WHITE PAPER: This white paper explains the benefits of a solution that can easily be added to an existing Data Guard configuration to provide an industry leading low-cost, time and space efficient solution to enterprise requirements for snapshots and clones.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

Oracle and Intel®

Best Practices for Maintaining GRC During the Modern Age of Cloud Computing, BYOD and Big Data
sponsored by IBM
EGUIDE: This expert e-guide details three steps for maintaining compliance during cloud deployment, how BYOD and the cloud increase risk and how cloud SLAs can alleviate that risk and enhance data recovery.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

IBM

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Hardening Hadoop for the Enterprise
sponsored by WANdisco
WEBCAST: Prepare for Hadoop implementation with this knowledgeable webcast.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

WANdisco

Workflow, governance and reporting – Solvency II
sponsored by IBM
WHITE PAPER: The following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
Posted: 23 May 2014 | Published: 23 May 2014

IBM

How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
sponsored by Clearswift
WHITE PAPER: In this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
Posted: 16 May 2014 | Published: 16 May 2014

Clearswift

A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
sponsored by Infrascale
WHITE PAPER: This resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
Posted: 14 May 2014 | Published: 14 May 2014

Infrascale

Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER: This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014

IBM

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

Preventing Dangerous File-Sharing
sponsored by Globalscape
WHITE PAPER: This resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
Posted: 09 May 2014 | Published: 31 Dec 2013

Globalscape

Transferring Data without Secure Protocols?
sponsored by Globalscape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

Globalscape