All resources sponsored by:

Absolute

11 Matches
Ransomware Protection: Five Best Practices
sponsored by Absolute
ANALYST REPORT:Security and risk professionals need to develop and implement the proper controls to slow and prevent the ransomware spread. In this Forrester Research Report, reveal the 5 best practices for ransomware protection.
Posted: 30 Jan 2018 | Published: 27 Jul 2017
Get This Now


4 Essential Strategies for Endpoint Security and Protection
sponsored by Absolute
WHITE PAPER:Endpoint devices are the single largest group of devices inside your network today. Disruption of endpoints can have a serious impact on your day to day business operations. This resource offers 4 essential strategies to improve your endpoint security and protection.
Posted: 30 Jan 2018 | Published: 30 Jan 2018
Get This Now


The Cost of Insecure Endpoints
sponsored by Absolute
ANALYST REPORT:According to the Ponemon Institute, just one failed endpoint can cost an organization an average of $612. Explore this Ponemon Institute report to gain insight into insecure endpoints and the excessive costs companies are spending after their endpoints are compromised.
Posted: 29 Jan 2018 | Published: 29 Jan 2018
Get This Now


5 Milestones to GDPR Success
sponsored by Absolute
ANALYST REPORT:The GDPR deadline is rapidly approaching with many privacy and security professionals unsure of where to begin to prep. To meet the May 2018 deadline, organizations must prepare today. Access this Forrester report to discover 5 milestones you must reach to achieve GDPR compliance success.
Posted: 26 Jan 2018 | Published: 26 Jan 2018
Get This Now


Complying with GDPR: What All Organizations Need to Know
sponsored by Absolute
WHITE PAPER:With GDPR rapidly approaching, companies are now facing the "Big 3": tough reporting, more responsibility, and bigger fines. Explore this white paper to gain a better understanding of GDPR regulations as well as a breakdown of the new penalties, the implications of BYOD and more.
Posted: 18 Oct 2017 | Published: 18 Oct 2017
Get This Now


Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE:In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014
Get This Now


HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER:In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013
Get This Now


Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act
sponsored by Absolute
CASE STUDY:This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.
Posted: 13 Nov 2013 | Published: 31 Dec 2012
Get This Now


La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute
VIDEO:In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013
Get This Now


Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute
WEBCAST:The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013
Get This Now


PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks
sponsored by Absolute
WHITE PAPER:Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk.
Posted: 14 Dec 2009 | Published: 14 Dec 2009
Get This Now


11 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement