Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Security Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Security Compliance Reports
Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HPE
sponsored by Hewlett-Packard Enterprise
VIDEO: This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets.
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Enterprise

Information Security Threats: Building Risk Resilience
sponsored by
EGUIDE: Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

Planning Out Your Financial Software Strategy
sponsored by IBM
EGUIDE: In this expert e-guide, explore the user-friendly, financial reporting and analytics tools to choose from that offer sophisticated insight into financial health. Additionally, uncover valuable tips on how to plan the migration from Excel to financial management software.
Posted: 13 May 2015 | Published: 13 May 2015


Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
sponsored by BlackBerry
WEBCAST: This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013


Hitting the Information Governance and Compliance Sweet Spot
sponsored by IBM
EGUIDE: In this expert e-guide from, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
Posted: 05 Aug 2013 | Published: 05 Aug 2013


What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014


Core HR Kit: Cut costs, engage your people, and ensure compliance
sponsored by SuccessFactors
WHITE PAPER: This resource offers insight to help you choose an effective core HR system. Read on to discover key benefits of the right tool and learn how you can get started today.
Posted: 04 Mar 2014 | Published: 04 Mar 2014


For regulated industries: Learning within a multi-tenant SaaS architecture
sponsored by SuccessFactors
WHITE PAPER: This resource describes the need for compliance with Good Practice requirements in regulated industries, explores key challenges of the validation process for learning environments, and evaluates whether multi-tenant SaaS architecture is a viable option.
Posted: 20 Feb 2014 | Published: 31 Dec 2013


Reducing the Costs of IT Security Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the IT security management challenges admins today are experiencing and unveils how sound identity and access management (IAM) practices and solutions can resolve many of these issues.
Posted: 12 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement