Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Legal Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Legal Compliance Reports
Managing Food Safety and Quality Using Enterprise Software
sponsored by IFS
WHITE PAPER: Access this white paper to learn how to get a solid grip on process manufacturing with the use of software.
Posted: 20 Feb 2015 | Published: 20 Feb 2015


Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013


A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Planning Out Your Financial Software Strategy
sponsored by IBM
EGUIDE: In this expert e-guide, explore the user-friendly, financial reporting and analytics tools to choose from that offer sophisticated insight into financial health. Additionally, uncover valuable tips on how to plan the migration from Excel to financial management software.
Posted: 13 May 2015 | Published: 13 May 2015


Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

Reducing the costs and risks of data storage in the federal government
sponsored by IBM
WHITE PAPER: This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
Posted: 29 Oct 2013 | Published: 30 Jun 2012


Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013


Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012


Hitting the Information Governance and Compliance Sweet Spot
sponsored by IBM
EGUIDE: In this expert e-guide from, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
Posted: 05 Aug 2013 | Published: 05 Aug 2013


Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT: In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013

SailPoint Technologies
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement