Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Sarbox

RSS Feed    Add to Google    Add to My Yahoo!
SarboxReports
 
Encrypting Private Data 101
sponsored by Iron Mountain
WHITE PAPER: Data protection is critical insurance against loss of data that could cripple a business. Creating a successful disaster recovery and data protection plan requires people, process and technology in the right recipe to be successful. It is not easy work, but it is essential work.
Posted: 11 May 2011 | Published: 11 May 2011

Iron Mountain

Revamping and optimizing your SAP GRC strategy
sponsored by Security Weaver
EBOOK: GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Security Controls Oversight for Sarbanes-Oxley Audit and Compliance
sponsored by ArcSight, an HP Company
WHITE PAPER: Download this white paper and learn how ensure your company's compliant with a security management strategy that enables you centrally collect, store, monitor and display security event data.
Posted: 24 Jan 2007 | Published: 01 Dec 2006

ArcSight, an HP Company

Monitoring Physical Threats in the Data Center
sponsored by APC by Schneider Electric
WHITE PAPER: This paper describes the class of threats, suggests approaches to deploying monitoring devices, and provides best practices in leveraging the collected data to reduce downtime.
Posted: 04 Feb 2009 | Published: 03 Feb 2009

APC by Schneider Electric

CWAT Data Loss Prevention - Whitepaper/Technical Review
sponsored by Software Engineering of America, Inc.
WHITE PAPER: CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks.
Posted: 25 Feb 2008 | Published: 01 Sep 2006

Software Engineering of America, Inc.

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

SearchSecurity.com

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
sponsored by SearchCompliance.com
EBOOK: Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

SearchCompliance.com

Turning the Compliance Challenge into a Business Advantage
sponsored by SAP America, Inc.
WHITE PAPER: New rules have spawned an army of consultants, vendors and solutions to address the "compliance" problem. Read this paper to learn how to turn the compliance challenge into a business advantage.
Posted: 26 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Regulations Shift Focus on Outbound Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them.
Posted: 10 Jul 2008 | Published: 10 Jul 2008

Proofpoint, Inc.

The IT/Compliance Challenge within Segregation of Duties: Eliminating Developer Access to the Production Environment
sponsored by BMC Software, Extending Value with Identify Software
WHITE PAPER: This white paper reviews effective methods for creating controlled, secure access to complete problem data for your developers so they can solve production problems without actually accessing your production environment.
Posted: 16 Nov 2006 | Published: 01 Nov 2006

BMC Software, Extending Value with Identify Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement