Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulations

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Government Regulations
DEFINITION: Authoritative rules or orders issued by a government agency and often having the force of law.
RegulationsReports
26 - 50 of 125 Matches Previous Page  | Next Page
The trust advantage: How to win at big data
sponsored by ComputerWeekly.com
ANALYST REPORT: Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous
sponsored by Iron Mountain
WHITE PAPER: This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy.
Posted: 16 Jul 2013 | Published: 31 May 2013

Iron Mountain

Information Security Threats: Building Risk Resilience
sponsored by SearchSecurity.com
EGUIDE: Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

Streamline Compliance Reporting to Effectively Meet Requirements
sponsored by APTARE
WHITE PAPER: Uncover key compliance requirements you should address in your backup strategy and learn how a central reporting tool can help you streamline compliance reporting, ensure data is protected throughout its entire lifecycle, and produce reports to quickly and accurately demonstrate compliance.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Hitting the Information Governance and Compliance Sweet Spot
sponsored by IBM
EGUIDE: In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

New standards for certified EHRs drive industry toward coordination
sponsored by HP & Intel®
EGUIDE: This E-guide from SearchHealthIT.com discusses the changing requirements of the new EHR certification standards. Read now to learn about the challenges and ways this new criteria will affect both health care providers and EHR vendors.
Posted: 01 Aug 2013 | Published: 05 Mar 2013

HP & Intel®

Novartis AG Success Story: How Novartis Increased Disposition Capabilities Ten-fold
sponsored by IBM
VIDEO: One of the top expenses of healthcare company Novartis is over-retention of records. This case study details the data retention solution they adopted that helped them improve their records management strategy. View now to learn more!
Posted: 26 Jul 2013 | Premiered: 26 Jul 2013

IBM

BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving
sponsored by IBM
CASE STUDY: This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

User Provisioning: The Business Imperative
sponsored by CA Technologies.
WHITE PAPER: Did you know utilizing a comprehensive provisioning tool can help you improve compliance, reduce costs, and improve operational efficiency? Read now to learn more!
Posted: 15 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

Reducing the Costs of IT Security Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the IT security management challenges admins today are experiencing and unveils how sound identity and access management (IAM) practices and solutions can resolve many of these issues.
Posted: 12 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com
26 - 50 of 125 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement