Compliance (Security) Reports

Focus: Analytics & data-driven insights
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, learn about the state of adoption of data analytics in Australia, how Commonwealth Bank is making analytics tools more accessible to small companies and how SAS is prepping its marketers for the data flood.
Posted: 08 Feb 2021 | Published: 02 Jun 2017

TechTarget ComputerWeekly.com

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

Business Driven Governance: Managing Policies for Data Retention
sponsored by IBM
WHITE PAPER: This resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
Posted: 27 Feb 2014 | Published: 31 Aug 2013

IBM

The Need for Cloud Computing Security Standards
sponsored by TechTarget Security
EGUIDE: While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

Welcome to Iron Mountain’s National Data Center
sponsored by Iron Mountain
WEBCAST: This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.
Posted: 27 Jan 2014 | Premiered: Jan 27, 2014

Iron Mountain

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AT&T Cybersecurity

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
sponsored by Oracle Corporation
WHITE PAPER: Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
Posted: 09 Apr 2012 | Published: 31 Jan 2012

Oracle Corporation

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by Syspro
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Syspro

E-Guide: Prioritizing Application Security Concerns
sponsored by TechTarget Security
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

TechTarget Security