Standards  >  

P3P

RSS Feed    Add to Google    Add to My Yahoo!
P3PReports
 
Data Protection Masterclass: New EU Data Protection Regulation
sponsored by ComputerWeekly.com
PRESENTATION: Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

ComputerWeekly.com

Enterprise Security Architecture – an outsourcer's view
sponsored by ComputerWeekly.com
PRESENTATION: Alan Jenkins, chief security officer of outsourcing specialist, T Systems, explains the company's approach to enterprise security architecture.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

ComputerWeekly.com

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

February Essentials Guide on Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.
Posted: 07 Feb 2012 | Published: 06 Feb 2012

SearchSecurity.com

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

E-Guide: Securing the cloud
sponsored by CA Technologies.
WHITE PAPER: The cloud has become a very popular way to cut costs and get ahead but the need for security standards is increasing at a rapid pace. Individuals all over, in diverse areas of business want to know that their information will/can be safe in the cloud. Read this expert E-Guide to gain an understanding for a necessary security standard in the cloud.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

CA Technologies.

Improving WAN Performance: Best Practices
sponsored by F5 Networks
EGUIDE: In this exclusive expert E-Guide from SearchNetworking.com, explore how you really can find the right balance between offering your users the performance and quality they want and having the security your organization needs.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

F5 Networks

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER: In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Posted: 16 Oct 2013 | Published: 31 Dec 2009

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
P3P White Papers | P3P Multimedia | P3P IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement