Regulatory Compliance Reports

PCI Compliant Yesterday. Still Compliant Today?
sponsored by Tripwire, Inc.
WEBCAST: This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.
Posted: 29 Jan 2010 | Premiered: Jan 29, 2010

Tripwire, Inc.

Presentation Transcript: Leveraging Your Most Valued Asset: Knowledge
sponsored by Vivisimo, Inc.
PRESENTATION TRANSCRIPT: Why do most organizations continuously fail in utilizing knowledge? In this presentation transcript, learn from case studies that illustrate how you can optimize the value of knowledge in your organization through improving e-discovery and data retention practices and eliminating wasteful and under-utilized tools.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

Vivisimo, Inc.

Cloud Computing in Perspective
sponsored by BMC Software, Inc.
WHITE PAPER: Many CIOs recognize the power of cloud computing and are looking to implement the technology in their own IT realms. But with all the noise in the market about cloud computing, how do you know where to begin? Learn how to better improve service delivery to your business with cloud computing.
Posted: 26 Jan 2010 | Published: 26 Jan 2010

BMC Software, Inc.

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

Consolidating SQL Server 2000 Databases from Dell PowerEdge 2650 Servers to a Dell PowerEdge R805 Server
sponsored by Dell and Microsoft SQL
ANALYST REPORT: Principled Technologies sought out to see how many Dell PowerEdge 2650s can be consolidated onto a single PowerEdge R805 with a Dell PowerVault MD1000 attached? We defined a consolidation methodology, which we detail later in this report; conducted multiple rounds of testing; and analyzed the results.
Posted: 28 Dec 2009 | Published: 28 Dec 2009

Dell and Microsoft SQL

Governance, Risk, Compliance: Policy Management Methods and Tools
sponsored by Symantec Corporation
EBOOK: IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions.
Posted: 15 Dec 2009 | Published: 11 Dec 2009

Symantec Corporation

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities
sponsored by Sophos
PRESENTATION TRANSCRIPT: Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution.
Posted: 10 Dec 2009 | Published: 10 Dec 2009

Sophos

Presentation Transcript: Legal Discovery and Your Messaging Environments - What's Important and Why!
sponsored by Daegis
PRESENTATION TRANSCRIPT: In this presentation transcript, learn how Lotus Notes Administrators play an important role in legal discovery. Find out how archiving systems can help meet compliance standards and gain an understanding of business requirements around e-discovery. Discover how to make sure your company’s information is properly archived.
Posted: 02 Dec 2009 | Published: 02 Dec 2009

Daegis

Data Loss Prevention 2.0: Preventing the loss of confidential information via webmail, Facebook, wikis and blogs
sponsored by Code Green Networks, Inc.
WHITE PAPER: In today’s technology rich environment organizations are finding employees often post sensitive company information to insecure or public Internet sites using Web 2.0 applications. Code Green Networks TrueDLP provides organizations with a complete data loss prevention solution to stop the loss or theft of confidential or proprietary information.
Posted: 09 Nov 2009 | Published: 09 Nov 2009

Code Green Networks, Inc.

Presentation Transcript: Getting Set for e-Discovery
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: In this presentation transcript, expert Michael A. Clark, Managing Director for EDDix LLC, highlights eDiscovery and offers insight for preparing your company for litigation.
Posted: 06 Nov 2009 | Published: 06 Nov 2009

Symantec Corporation

eBook: IT in the Electronic Hospital
sponsored by TechTarget CIO and TechTarget Security
EBOOK: The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

All resources sponsored by TechTarget CIO and TechTarget Security

NERC: What You Need to Know
sponsored by TechTarget Security
EBOOK: The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

TechTarget Security

Performance Management Applications Overview
sponsored by Oracle Corporation
WHITE PAPER: Hyperion performance management applications deliver a wide range of Business benefits as well as IT benefits; this overview outlines key benefits.
Posted: 12 Oct 2009 | Published: 01 Dec 2008

Oracle Corporation

eBook: Email Archiving - Planning, Policies and Product Selection: Analyzing Email Archiving Features for Productivity
sponsored by Symantec Corporation
EBOOK: Chapter 4 of this e-book gives advice on determining your email archiving goals and policies to establish a set of system features that match your company’s needs and boost archiving efficiency.
Posted: 09 Oct 2009 | Published: 01 Oct 2009

Symantec Corporation

eBook - Email Retention: Standards and Practices
sponsored by TechTarget Security
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

TechTarget Security

Dell Software Inventory & Usage Management
sponsored by Dell, Inc. and Intel®
DATA SHEET: The Dell Software Inventory & Usage Management service automates software and hardware asset discovery and reporting, monitors software usage and helps simplify software license compliance helping managers to control IT costs, reduce software license compliance risks, and make informed decisions regarding software purchasing...
Posted: 07 Oct 2009 | Published: 07 Oct 2009

Dell, Inc. and Intel®

Virtual Data Center E-Zine - Volume 15: Staying Compliant in a Virtual World
sponsored by TechTarget Data Center
EZINE: In this month's issue, learn how to keep compliance a priority in a virtualized environment. Also in this issue, get advice on how to buy hardware for virtual systems, and take a closer look at your storage needs.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

TechTarget Data Center

Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Novell, Inc.

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance
sponsored by Skybox Security
PRESENTATION TRANSCRIPT: PCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Skybox Security

Sustainability Matters: Why - and how - business is widening its focus to consider the needs of stakeholders
sponsored by Oracle Corporation
WHITE PAPER: This white paper demonstrates how running a responsible business and high levels of performance do not have to work against each other. And it makes a case for why sustainability issues should simply be part of a company’s overall performance management practices.
Posted: 15 Sep 2009 | Published: 01 Dec 2008

Oracle Corporation

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

Information Security Magazine

Email Archiving: Planning, Policies and Product Selection - Chapter 3
sponsored by TechTarget Search Windows Server
EBOOK: It's critical to identify the key features when selecting an email-archiving system for risk reduction. The most important part of the process is defining the company's email-retention goals and policies. This chapter will discuss several tips for choosing the proper email-archiving product features for your organization.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

TechTarget Search Windows Server

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.