Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Legal Compliance

RSS Feed   
Legal Compliance White Papers (View All Report Types)
 
A Practical Approach to Authentication in an Evolving Enterprise Environment
sponsored by Entrust, Inc.
WHITE PAPER: View this white paper to explore how to find the balance between compliance, remote workers, and reducing costs, top authentication methods, key condiserations for enterprise authentication, and more. 
Posted: 22 Aug 2011 | Published: 17 Aug 2011

Entrust, Inc.

Iron Mountain EMR Scanning Survey Report
sponsored by Iron Mountain
WHITE PAPER: 70% of hospitals expect to meet EHR meaningful use guidelines this year. Yet, 78% expect to continue to treat patients using paper records for up to 5 more years despite the financial incentive for meeting these requirements. Inside this white paper, learn how your peers are transitioning to an EHR system.
Posted: 15 Sep 2011 | Published: 14 Sep 2011

Iron Mountain

Staying Ahead of Cyberthreats: Recommendations for Financial Institutions
sponsored by Dell SecureWorks
WHITE PAPER: Today’s investment firms and banks continue to struggle with the growing number of security and regulatory challenges they face. This paper explores the serious threats that financial institutions face and what they can do to address them.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Dell SecureWorks

For regulated industries: Learning within a multi-tenant SaaS architecture
sponsored by SuccessFactors
WHITE PAPER: This resource describes the need for compliance with Good Practice requirements in regulated industries, explores key challenges of the validation process for learning environments, and evaluates whether multi-tenant SaaS architecture is a viable option.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

SuccessFactors

Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER: While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Sybase, an SAP company

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business.
Posted: 15 Jul 2011 | Published: 05 Jul 2011

GeoTrust, Inc.

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Securing the Cloud for the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Despite the many the benefits of the cloud, one key challenge still remains a concern – Security. View this paper as it explores the security challenges of the cloud and offers key principles that can help address the security and compliance concerns in an evolving threat and compliance landscape.
Posted: 23 Sep 2011 | Published: 22 Sep 2011

Symantec Corporation

LogRhythm and NERC
sponsored by LogRhythm, Inc.
WHITE PAPER: The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

LogRhythm, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement