Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Legal Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Legal ComplianceReports
 
Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Resolving the Catch-22 of UC&C in Regulated Environments
sponsored by Dimension Data
WHITE PAPER: This white paper explains why organizations in regulated sectors like finance, government, and healthcare have a different set of requirements for cloud-based unified communications and collaboration services, and introduces a suite of email and collaboration tools that meets these needs.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dimension Data

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

The ROI of a New Learning Management System (LMS): How to Construct a Successful Business Case
sponsored by SuccessFactors
WHITE PAPER: This resource describes key features and capabilities of a new-generation learning management system (LMS), and counts down six steps for demonstrating LMS value, rooted in ROI. Learn how you can make a successful business case for an LMS by reading on now.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

SuccessFactors

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement