Compliance (Systems Operations) Reports

Intelligent Data Management with Symantec's Enterprise Vault 9.0 & Dell's DX Object Based Storage - Presentation Transcript
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about an archiving solution that allows businesses to efficiently manage the increasing costs associated with storage growth, compliance and litigation.
Posted: 04 Oct 2010 | Published: 30 Sep 2010

Symantec Corporation

Zen and the Art of the Balanced Scorecard
sponsored by Oracle Corporation
WHITE PAPER: As much an art as a science, the balanced scorecard is a living process that must be adaptive to constantly changing external forces and internal course corrections. You learn as you go. This paper contains a few guiding principles that will help you along the way.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Risk Management: Protect and Maximize Stakeholder Value
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats.
Posted: 01 Oct 2010 | Published: 02 Feb 2009

Oracle Corporation

Journal of Management Excellence - Enterprise Performance Management Innovations
sponsored by Oracle Corporation
WHITE PAPER: This collection of journal articles focuses on the many facets of enterprise performance management that can help organizations thrive through the recovery, including; integrating the financial close and reporting process, managing the transition to IFRS, centralized enterprise dimension management.
Posted: 01 Oct 2010 | Published: 01 Apr 2010

Oracle Corporation

Delivering Enterprise Value with Oracle Governance, Risk & Compliance
sponsored by Oracle Corporation
WHITE PAPER: In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Solutions Brief: Oracle Solutions for Governance, Risk and Compliance
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn about Oracle’s comprehensive GRC platform and how leading enterprises are turning to Oracle’s new platform to meet the demands of increasingly challenging regulatory mandates while continuing to innovate and grow their business.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Consolidate Storage Infrastructure and Create a Greener Datacenter
sponsored by Oracle Corporation
WHITE PAPER: Read this paper to learn how to find ways to cope with an expanding storage infrastructure, as well as provide continuous access to data stored on reliable and secure media, meet stringent compliance regulations and create operational efficiency while simultaneously cutting costs.
Posted: 01 Oct 2010 | Published: 14 Apr 2010

Oracle Corporation

E-Book: NERC Compliance
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

TechTarget Security

Ecomanage Network Corporation Develops a Service Offering for Manufacturers to Fully Manage Wastes and Meet Disposal Regulations
sponsored by IBM
CASE STUDY: Read this case study to see how IBM Global Services implemented and is operating the Wastes and Resources Circulation Management System, a hybrid solution of private and public cloud computing.
Posted: 24 Sep 2010 | Published: 26 Oct 2009

IBM

Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

Iron Mountain

E-Book: Red Flag Rules Compliance
sponsored by Gemalto
EBOOK: SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Gemalto

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva

File Security: Audit and Protect Critical Files
sponsored by Imperva
WHITE PAPER: Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
Posted: 30 Aug 2010 | Published: 30 Aug 2010

Imperva

Knowledge is Power
sponsored by IBM
WHITE PAPER: Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

How the Guardium Platform Helped Dell IT Simplify Enterprise Security
sponsored by Guardium, an IBM Company
WHITE PAPER: Safeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.
Posted: 10 Aug 2010 | Published: 10 Aug 2010

Guardium, an IBM Company

Mitigating Risk and Ensuring Compliance with EMC Documentum ApplicationXtender Retention Manager
sponsored by EMC Corporation
WHITE PAPER: Read this white paper to learn how to easily configure document retention and disposition policies in the background to mitigate risk and meet compliance goals.
Posted: 04 Aug 2010 | Published: 04 Aug 2010

EMC Corporation

All Qualified Security Assessors Are Not Created Equal
sponsored by AT&T Corp
WHITE PAPER: The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment
Posted: 04 Aug 2010 | Published: 04 Aug 2010

AT&T Corp

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER: Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER: Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Avoiding the Top 5 Vulnerability Management Mistakes: The New Rules of Vulnerability Management
sponsored by eEye Digital Security
WHITE PAPER: In this guide, you’ll learn how to avoid the top five vulnerability management mistakes to protect critical IT assets and improve your security posture, while reducing costs. Read this paper to learn more.
Posted: 10 Jul 2010 | Published: 09 Jul 2010

eEye Digital Security

Virtual Data Center E-Zine - Volume 24: Strategies to Manage Virtual Data Center Growth
sponsored by TechTarget Data Center
EZINE: Read this paper to learn how virtualization has been hyped as the answer for data center growth. And while consolidation can solve some of the challenges associated with running more workloads.
Posted: 07 Jul 2010 | Published: 07 Jul 2010

TechTarget Data Center

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

The State of Privacy and Data Security Compliance
sponsored by Sophos
ANALYST REPORT: The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.
Posted: 25 Jun 2010 | Published: 30 Nov 2009

Sophos

Information Security Magazine – June 2010: Laptop Lockdown
sponsored by Information Security Magazine
EZINE: This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
Posted: 16 Jun 2010 | Published: 16 Jun 2010

Information Security Magazine