Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Security Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Security ComplianceReports
 
Bringing DLP Inside the Organization
sponsored by Clearswift
WHITE PAPER: This white paper delves into the subject of data loss prevention (DLP) inside the organization, examining the way that critical information is shared within a business and discussing the pros and cons of implementing DLP solutions at different points.
Posted: 15 Oct 2014 | Published: 31 Dec 2013

Clearswift

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

The Need for Data Loss Prevention Now
sponsored by Clearswift
WHITE PAPER: This resource takes a deep look at why data leakage prevention (DLP) is so vital to data protection, explains the multiple ways data can leak out of your enterprise, and outlines a five-step approach to reaching DLP nirvana.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

Clearswift

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

Information Governance Symposium: Data governance on the move: Keeping mobile data safe
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Enter this interactive, online learning environment to learn more about the evolution of mobile device use in the corporate setting, and how to adapt information management processes accordingly.
Posted: 26 Mar 2014 | Premiered: 28 Mar 2014

SearchCompliance.com

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

CA Technologies Strategy & Vision for Cloud Identity and Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!
Posted: 19 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

A Prescription for IT Efficiency
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This resource examines new risks and threats that are making Windows XP unsafe for use in a healthcare setting, and details the essential security capabilities and benefits offered by Windows 7 and Windows 8.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Dell, Inc. and Windows 8 Pro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement