Software  >   Applications Software  >   Enterprise Applications Software  >  

Security Compliance Software

RSS Feed    Add to Google    Add to My Yahoo!
Security Compliance SoftwareReports
 
Information Governance Symposium: Properly Managing Your Records in an eDiscovery World Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This classroom examines the changing records management landscape – and e-discovery's overlying impact on that transformation. Through a review of e-discovery best practices, practical solutions, and tools for implementation, users will gain essential understanding of how to tackle records management and e-discovery needs today.
Posted: 21 May 2013 | Premiered: 21 May 2013

SearchCompliance.com

CW500: Best practice in BYOD
sponsored by ComputerWeekly.com
PRESENTATION: Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

ComputerWeekly.com

Case Study: Fortune 20 Global Financial Company Achieves End-to-End Data Protection
sponsored by APTARE
CASE STUDY: This white paper explores how one organization easily and affordably deployed a backup solution that helps them prevent backup failures through better management and reporting of their data protection processes.
Posted: 05 Jul 2013 | Published: 28 Jun 2013

APTARE

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Building A Powerful IM Strategy for Large Organizations
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: Large organizations face challenges in identifying and defining requirements for the implementation of information management strategies. This classroom will lead you through Enbridge Inc.'s journey - from understanding business risks and gaining executive support, to elaborating, staffing, and implementing measureable execution techniques.
Posted: 01 Apr 2013 | Premiered: 02 Apr 2013


E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

A Practical Guide to Records Management in the Digital Era
sponsored by Iron Mountain
WHITE PAPER: Making the transition to digital management of paper and electronic records is challenging. Companies can't risk efficiency or accuracy with their data, and may need a more simplified approach during the transition. View this resource to uncover a more practical approach to records management in the digital era.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Iron Mountain

Recordkeeping Needs Assessment Case Study: Using the Cloud to Improve Dismal Scores
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom explores the methodology used to conduct an early Generally Accepted Recordkeeping Principles® needs assessment (N.A.), followed by a discussion of how the N.A. led to the selection of a Cloud provider to improve dismal scores.
Posted: 02 Apr 2013 | Premiered: 02 Apr 2013


Using a Gateway to achieve PCI compliance
sponsored by Forum Systems
WHITE PAPER: This exclusive resource examines a gateway product that can help your organization achieve PCI compliance.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Forum Systems

Enterprise Security: Why you need Effective Log Management
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement