Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Security Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Security ComplianceReports
 
5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9, Inc.
WHITE PAPER: This helpful white paper outlines 5 steps for reducing the complexity of PCI assessments, lowering administration costs, and accelerating the attainment of a compliant and secure environment.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Bit9, Inc.

Providers Go Direct to Securely Accelerate Transitions of Care and Referrals
sponsored by Kodak
WHITE PAPER: In this white paper, you'll learn how Direct Messaging works; how it can benefit hospitals, physicians, and patients; and how it can help providers meet regulatory requirements.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Kodak

Take control of your records: HP Records Management Services
sponsored by Hewlett-Packard Company
WHITE PAPER: Discover how HP Records Management Services can help simplify compliance with regulatory mandates, boost collaboration and productivity, automate processes and provide secure access to document.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Hewlett-Packard Company

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Vulnerability Management and Risk Assessment for the Cybersecurity Framework
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes one company's scalable, targeted approach to helping organizations meet the vulnerability and compliance requirements set by the NIST's Cybersecurity Framework.
Posted: 11 Nov 2014 | Published: 24 Feb 2014

Tenable Network Security

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
VIDEO: While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: 19 Feb 2014

Imperva

Business Driven Governance: Managing Policies for Data Retention
sponsored by IBM
WHITE PAPER: This resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
Posted: 27 Feb 2014 | Published: 31 Aug 2013

IBM

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement