The Maturity Model for Governance, Risk, and Compliance
sponsored by Aptible
EBOOK:
For more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.
Posted: 07 Dec 2020 | Published: 07 Dec 2020
|
|
|
GDPR: Risk, opportunity and what it means for security professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
Posted: 10 May 2018 | Published: 10 May 2018
|
|
|
Weighing the Risks, Challenges and Benefits Before Diving into BYOD
sponsored by SearchSecurity.com
EGUIDE:
This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!
Posted: 22 Mar 2013 | Published: 22 Mar 2013
|
|
|
BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE:
This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012
|
|
|
Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT:
In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013
|
|
|
Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER:
This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012
|
|
|
Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER:
Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011
|
|
|
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER:
Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013
|
|
|
The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER:
This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013
|
|
|
Simple Strategies for BYOD Compliance
sponsored by CDW Corporation
EGUIDE:
This expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.
Posted: 06 Mar 2014 | Published: 06 Mar 2014
|
|
|
|
|