How Consumerization Affects Security and Compliance
sponsored by TechTarget Security
EBRIEF:
The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012
|
|
|
Great collaboration begins with good governance
sponsored by TechTarget Content Management
EGUIDE:
For a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.
Posted: 21 Nov 2011 | Published: 21 Nov 2011
|
|
|
E-Guide: Integrating security into the ALM lifecycle
sponsored by TechTarget Security
EGUIDE:
In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011
|
|
|
Creating a Compliance Culture: Best Practices
sponsored by TechTarget Security
EGUIDE:
Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011
|
|
|
Comparing health care data security compliance to other industries
sponsored by Hewlett Packard Enterprise
EGUIDE:
This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.
Posted: 09 Apr 2012 | Published: 09 Apr 2012
|
|
|
Best and Worst Practices for Exchange email archiving
sponsored by Metalogix
EGUIDE:
In this expert e-guide, discover the best and worst practices for email archiving, and review an essential checklist for ensuring that Exchange archives remain compliant.
Posted: 01 Apr 2012 | Published: 29 Mar 2012
|
|
|
Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT:
This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012
|
|
|
Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE:
This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012
|
|
|
eBook: Trends in Healthcare Data Protection
sponsored by LANDesk Software
EBOOK:
This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
Posted: 22 Mar 2012 | Published: 22 Mar 2012
|
|
|
Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System
sponsored by Iron Mountain
WHITE PAPER:
Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012
|
|
|
IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE:
As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012
|
|
|
Deploying desktop virtualization technology in a health care setting
sponsored by Accelera Solutions
EGUIDE:
This E-Guide addresses the most important considerations for health care organizations that are planning - or are in the midst of - virtual desktop implementation.
Posted: 21 Feb 2012 | Published: 21 Feb 2012
|
|
|
Optimise the Healthcare Data Centre through Operational Efficiency and Data Resilience
sponsored by Hitachi Vantara
WHITE PAPER:
This white paper offers valuable insight into how modern health care facilities can ensure the continuity of operations, even in the face of an unforeseen disaster. Additionally, the ROI associated with a data resilience plan is explored.
Posted: 17 Feb 2012 | Published: 17 Feb 2012
|
|
|
E-Guide: Health care, cloud storage providers and data ownership
sponsored by Intel
EGUIDE:
This E-Guide discusses the HIPAA requirements around patient’s access to his or her records as well as issues surrounding data ownership when health care data is stored in the cloud.
Posted: 17 Feb 2012 | Published: 17 Feb 2012
|
|
|
Closed-loop Records Management: The Stakes Are Too High to Ignore
sponsored by RSD
WHITE PAPER:
As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.
Posted: 15 Feb 2012 | Published: 15 Feb 2012
|
|
|
UCB Gains Efficiencies and Realizes Lower TCO with CallCopy Call Recording
sponsored by NACR
CASE STUDY:
Uncover why a implementing a CallCopy recording solution that is easy to use, search, update, support and maintain can offer a lower TCO than other solutions, as well as fulfilling all your call recording needs.
Posted: 10 Feb 2012 | Published: 10 Feb 2012
|
|
|
Cloud Security Myths and Strategies Uncovered
sponsored by VMware, Inc.
WHITE PAPER:
Security and compliance is the most often-cited barrier to cloud adoption. Read what David Hunter, CTO of Platform Security from VMware, and Art Coviello Jr., Executive Chairman of RSA, say about ensuring control and visibility in a secure cloud.
Posted: 11 Jan 2012 | Published: 11 Jan 2012
|
|
|
Usability and Compliance: The Carrots and Sticks that Drive E-Procurement Success
sponsored by Simplifying-IT
WHITE PAPER:
Enhancing usability is the key to getting beyond tacit user acceptance of an e-Procurement system to the full adoption and compliance that yields cost reduction and full ROI. Read this paper to learn the full compliance strategies that best-in-class organizations are using for their e-Procurement implementations.
Posted: 09 Jan 2012 | Published: 06 Jan 2012
|
All resources sponsored by Simplifying-IT
|
|
Channel Ezine December
sponsored by IBM
EZINE:
How are you expanding your business in the channel in 2012? What areas of specialization are your customers clamoring for? What are you doing to address their needs? Check out this December issue of Channel Strategies and make sure you're on the right track for 2012.
Posted: 19 Dec 2011 | Published: 19 Dec 2011
|
|
|
Data Centre Energy Efficiency IT Handbook
sponsored by TechTarget Data Center
EBOOK:
The deadline for the UK's Carbon Reduction Commitment scheme has now passed, and companies will begin to receive fines if they can't demonstrate how they've reduced their carbon footprint or are putting processes in place to do so. This expert IT handbook offers detailed information about this new regulation and how organisations can adhere to it.
Posted: 07 Dec 2011 | Published: 07 Dec 2011
|
|
|
5 "Need To Knows" : Cloud Archiving for e-Discovery/Compliance
sponsored by FuseMail
EGUIDE:
Retrieval requests, such as those associated with e-discovery and compliance, can be a problem for companies and IT managers today. Fortunately, cloud-based archiving is on the rise and can fulfill your compliance demands. Check out this SearchCloudStorage.com E-Guide to learn five “must knows” and more.
Posted: 29 Nov 2011 | Published: 29 Nov 2011
|
|
|
How to Comply with the HPAA Security Rule
sponsored by Redspin, Inc.
EGUIDE:
The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.
Posted: 21 Nov 2011 | Published: 21 Nov 2011
|
|
|
Protecting Vital Business Interests with a Simplified Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER:
Data growth and regulatory requirements have made backup, recovery, and archiving critical aspects of enterprise operations. Dell Services experts can assess how effectively an information infrastructure is getting the job done and deploy integrated, best-of-breed storage solutions to help ensure the safety and recoverability of critical data.
Posted: 15 Nov 2011 | Published: 15 Nov 2011
|
|
|
Compliance and Risk Management: Factoring compliance as part of your risk management equation
sponsored by IBM
EBOOK:
Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.
Posted: 14 Nov 2011 | Published: 14 Nov 2011
|
|
|
A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE:
Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011
|
|