Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Government Regulations

RSS Feed    Add to Google    Add to My Yahoo!
Government Regulations Reports
 
The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

The Need for Third - Party Archiving in Office 365
sponsored by Zovy LLC
WHITE PAPER: Access this white paper to learn about third party email archiving to decide if it's right for you.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Zovy LLC

BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving
sponsored by IBM
CASE STUDY: This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
sponsored by BlackBerry
WEBCAST: This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

BlackBerry

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance
sponsored by Oracle Corporation
WHITE PAPER: When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

The Next Big Thing in AP … Positioning AP for the Future
sponsored by Kofax, Inc.
WHITE PAPER: The stress, demands and challenges that happen within accounts payable (AP) can lead to major mistakes resulting in compliance issues, or large financial blunders. This white paper discuses ways to automate business processes within accounts payables departments.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Kofax, Inc.

Compliance Frameworks That Enhance e-Discovery Effectiveness
sponsored by AXS-One, a Daegis Company
EGUIDE: The threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

AXS-One, a Daegis Company

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

On Common Ground: Where Compliance and Data Protection Overlap
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, we first explore the landscape in which CISOs now work—the new standards and regulations they face, increased attacks from hackers, and a more complex IT environment that includes virtualized infrastructure and outsourcing.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement