Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed   
Compliance Best Practices Reports
1 - 25 of 539 Matches Previous Page  |  Next Page
Overhauling Endpoint Protection Aids Innovation and Strengthens Security Posture
sponsored by McAfee, Inc.
CASE STUDY: In this case study, follow the journey of Sutherland Global Services, a business process transformation provider with a growing number of global endpoints, as they partner with McAfee in order to provide 24/7 availability to their workforce, unify security processes and address compliance requirements.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

McAfee, Inc.

Beyond COVID-19 Webinar
sponsored by Hyperproof
WEBCAST: COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.
Posted: 14 Sep 2020 | Premiered: Sep 14, 2020

Hyperproof

Qorus Software Uses Hyperproof to Gain Control Over Its Compliance Program
sponsored by Hyperproof
CASE STUDY: In this case study, follow Qorus, a sales enablement and proposal management provider, as they partner with Hyperproof to address security and compliance issues and achieve flexibility that scales as the organization grows.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Hyperproof

SASE For Dummies
sponsored by Cato Networks
EBOOK: SASE converges the functions of networking and network security point solutions into a unified, global, cloud-native service. It is an architectural transformation of enterprise networking and security that enables IT to provide a holistic, agile, and adaptable service to the digital business. Read this e-book to learn the basics of SASE.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cato Networks

The Three Mega Trends CISOs Need to Watch
sponsored by Hyperproof
EGUIDE: Today’s CISO faces pressure on many fronts – an expanding threat landscape, an exponentially growing volume of data and increasingly stringent data privacy laws. Read this guidebook to discover how CISOs can navigate and manage each of these challenges, and more.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Hyperproof

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

The CIO’s Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Disaster Recovery with Pure Cloud Block Store
sponsored by Pure Storage
DATA SHEET: Access this data sheet for an overview of common risk management challenges, learn how disaster recovery in the cloud can help, and examine a case study that brings it all into the real world.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Pure Storage

Survey Report: Evolution of the CASB
sponsored by Proofpoint
ANALYST REPORT: In the wake of COVID-19, work-from-home orders issued by most companies and governments have accelerated the digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the enterprise. View this report to get a perspective on the use of CASBs.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Proofpoint

Achieving Audit-Readiness for Security Standards Compliance in Modern IT Environments
sponsored by Xtravirt
WHITE PAPER: Modern IT environments are highly complex and staying compliant with security standards can be time-consuming. Download this white paper and discover how your organization can achieve audit readiness, ensure continuity of service, and earn customer trust. Read Now.
Posted: 02 Sep 2020 | Published: 31 Aug 2020

Xtravirt

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

Is Hybrid Cloud Right For Your Business?
sponsored by VMware & Rackspace Technology
WHITE PAPER: 84% of Australian organisations have a strategic approach to cloud computing. Hybrid clouds are helping businesses to become faster, more productive, more competitive and more efficient. That said, it can be difficult to devise a strategy to manage applications, data and infrastructure. Read this white paper to learn how to handle this challenge.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

VMware & Rackspace Technology

Egress Prevent
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: An emerging practice in today’s email security strategies is the implementation of preventative measures to stop data breaches before they happen – regardless if they’re accidental or intentional. This solution brief explores the key features and capabilities of Egress Prevent, which uses machine learning to secure email inboxes and users.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Egress Software Technologies Inc

Egress Protect
sponsored by Egress Software Technologies Inc
PRODUCT OVERVIEW: Email protection strategies often fall short of meeting the necessary compliance and security requirements to adequately secure sensitive data being shared. In this solution brief, explore the key features and capabilities of Egress Protect, designed to intelligently secure emails and large files with the appropriate level of security.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Egress Software Technologies Inc

The Periodic Table of Data Protection
sponsored by Dell Technologies & Intel®
EBOOK: Based on today's increasing threats to data integrity on a number of fronts, the topic of data protection is a primary concern. View this comprehensive e-book to navigate the complexities of enterprise data protection and to view all the options you have at your disposal.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Dell Technologies & Intel®

Endpoint Controls
sponsored by Cybereason
PRODUCT OVERVIEW: In order to manage the modern cyberthreat landscape, organizations need security policies that ensure protection and compliance without impacting efficiency. This solution brief provides an overview of the key features of Cybereason Endpoint Security – read on to learn more.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Cybereason

Securing the Workplace of the Future
sponsored by Tehama
EBOOK: By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.
Posted: 24 Aug 2020 | Published: 27 Nov 2019

Tehama

Data Protection Compliance in the UK
sponsored by Zivver
EBOOK: GDPR has ushered in a new era of data protection for European organizations – but what does data protection and compliance look like for the UK amid their decision to leave the EU? The following e-book highlights the evolution of data protection in the UK and offers a comprehensive checklist for ensuring GDPR-readiness.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Zivver

Tax Automation reduces costs and meets security and compliance requirements
sponsored by Pulsant
CASE STUDY: In this case study, follow Tax Automation, a tax software company based in the UK, as they partner with Pulsant to streamline the delivery and accessibility of their offerings through a transition towards a SaaS model. Read on to discover the Tax Automation’s challenges, required capabilities and results.
Posted: 20 Aug 2020 | Published: 20 Aug 2020


Addressing Enterprise Security Challenges
sponsored by Rackspace
VIDEO: In this webinar, you’ll hear from 2 keynote speakers. The first speaker is an AWS Specialist Solutions Architect who provides an in-depth analysis of the most pressing cybersecurity challenges for enterprises. The second speaker, an Principal Architect at Rackspace, takes over to discuss achieving operational efficiency in cloud environments.
Posted: 19 Aug 2020 | Premiered: 19 Aug 2020

Rackspace

It’s All About the Data
sponsored by Tala Security
WHITE PAPER: Online retailers are quickly realizing that enhanced user experience often comes at the cost of security – but that doesn’t necessarily need to be the case. In this blog post, take a closer look at the challenges, risks and opportunities as they related to data privacy and security.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

Security Without Compromise
sponsored by Remediant
CASE STUDY: As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Remediant
1 - 25 of 539 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info