Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Sarbanes Oxley Act

RSS Feed    Add to Google    Add to My Yahoo!
Sarbanes Oxley ActReports
 
Encrypting Private Data 101
sponsored by Iron Mountain
WHITE PAPER: Data protection is critical insurance against loss of data that could cripple a business. Creating a successful disaster recovery and data protection plan requires people, process and technology in the right recipe to be successful. It is not easy work, but it is essential work.
Posted: 11 May 2011 | Published: 11 May 2011

Iron Mountain

Global Best Practices in Email Security, Privacy and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution.
Posted: 06 Aug 2008 | Published: 06 Aug 2008

Proofpoint, Inc.

Log Management Best Practices
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA, The Security Division of EMC

Regulations Shift Focus on Outbound Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them.
Posted: 10 Jul 2008 | Published: 10 Jul 2008

Proofpoint, Inc.

Turning the Compliance Challenge into a Business Advantage
sponsored by SAP America, Inc.
WHITE PAPER: New rules have spawned an army of consultants, vendors and solutions to address the "compliance" problem. Read this paper to learn how to turn the compliance challenge into a business advantage.
Posted: 26 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Security Controls Oversight for Sarbanes-Oxley Audit and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: Download this white paper and learn how ensure your company's compliant with a security management strategy that enables you centrally collect, store, monitor and display security event data.
Posted: 24 Jan 2007 | Published: 01 Dec 2006

ArcSight, an HP Company

Case Study: Fortune 100 Insurance Company and Security Weaver
sponsored by Security Weaver
CASE STUDY: For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.

Sustaining Sarbanes-Oxley Compliance: Best Practices to Mitigate Risk, Automate Compliance, and Reduce Costs
sponsored by Tripwire, Inc.
WHITE PAPER: To successfully sustain compliance, organizations must implement best practices to ensure IT systems not only achieve a known and trusted state but they also maintain that state. Check out this white paper to learn how Tripwire solutions enable organizations to achieve and sustain SOX compliance.
Posted: 08 Jan 2009 | Published: 08 Jan 2008

Tripwire, Inc.

Best Practices for Database Security and Compliance
sponsored by Guardium, an IBM Company
WEBCAST: Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)

Guardium, an IBM Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement