Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Section 404

RSS Feed    Add to Google    Add to My Yahoo!
Section 404 Reports
 
Secure and Compliant Collaboration and Access
sponsored by IBM
WHITE PAPER: As part of its comprehensive security framework, IBM offers a broad, unified array of integrated access authorization and identity management solutions that enable organizations to secure their collaboration and access processes in alignment with their overall business needs.
Posted: 28 Oct 2009 | Published: 31 Mar 2008

IBM

Why Compliance Pays: Reputations and Revenues at Risk Research Report
sponsored by Symantec Corporation
WHITE PAPER: Based on what is working among organizations with the fewest data losses, this IT Policy Compliance Group report identifies several practices that can assist businesses with improving IT compliance results and reduce business downtime.
Posted: 09 Mar 2009 | Published: 09 Mar 2009

Symantec Corporation

Get the Facts on Information Availability: Essential Data Protection, Recovery and Resiliency for Banks
sponsored by Vision Solutions
WHITE PAPER: The power of an information availability solution lies in its ability to transform any nonproductive, non-profitable downtime into the optimum level of value-producing business uptime.
Posted: 09 May 2008 | Published: 01 Jan 2007

Vision Solutions

Information Security Magazine - October 2009: Security 7 Awards
sponsored by Information Security Magazine
EZINE: The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.
Posted: 13 Oct 2009 | Published: 13 Oct 2009

Information Security Magazine

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

File Archive: the next big thing?
sponsored by EMC Corporation
VIDEO: Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.
Posted: 08 Oct 2013 | Premiered: 08 Oct 2013

EMC Corporation

The Renewed Finance Function: Extending Performance Management Beyond Finance
sponsored by SAP America, Inc.
WHITE PAPER: In August 2007, CFO Research Services launched a research program to explore the ways in which the role of the finance team has changed in recent years. This report presents the findings of our online survey of 255 senior finance executives.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

The Information Governance Imperative
sponsored by RSD
WHITE PAPER: Read this paper to learn how information governance is becoming more important in today's business world and learn why your organization needs to implement an information governance strategy today and how to go about implementing one.
Posted: 04 Aug 2009 | Published: 04 Aug 2009

RSD

Riverbed Steelhead Product Family Data Sheet
sponsored by Riverbed Technology, Inc.
DATA SHEET: What's the Riverbed difference? Speed. Scalability. And simplicity. Discover it for yourself and get the facts about the entire family of Steelhead solutions from Riverbed. Companies of all sizes depend on the Riverbed Steelhead product family to accelerate the performance of applications over the WAN.
Posted: 31 Mar 2009 | Published: 31 Mar 2009

Riverbed Technology, Inc.

The Business Case for Data Security
sponsored by Imperva
WHITE PAPER: This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement