Compliance Best Practices Reports

E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

How Consumerization Affects Security and Compliance
sponsored by SearchSecurity.com
EBRIEF: The trend of consumerization is changing the way your employees and organization work, but is also affecting security and compliance. A number of new issues are emerging because of this trend, but with adequate monitoring and policies to protect corporate data, you can protect your crown jewels.
Posted: 09 Mar 2012 | Published: 29 Feb 2012

SearchSecurity.com

Great collaboration begins with good governance
sponsored by SearchContentManagement
EGUIDE: For a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchContentManagement

E-Guide: Integrating security into the ALM lifecycle
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

SearchSecurity.com

Creating a Compliance Culture: Best Practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

Risk Management: Safeguarding Against a World of Threats
sponsored by HP Enterprise Security
EBOOK: Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.
Posted: 17 May 2012 | Published: 01 May 2012

HP Enterprise Security

Comparing health care data security compliance to other industries
sponsored by Hewlett Packard Enterprise
EGUIDE: This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Hewlett Packard Enterprise

Best and Worst Practices for Exchange email archiving
sponsored by Metalogix
EGUIDE: In this expert e-guide, discover the best and worst practices for email archiving, and review an essential checklist for ensuring that Exchange archives remain compliant.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

Metalogix

Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT: This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012

HP Enterprise Security

Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE: This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

HP Enterprise Security

eBook: Trends in Healthcare Data Protection
sponsored by LANDesk Software
EBOOK: This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
Posted: 22 Mar 2012 | Published: 22 Mar 2012

LANDesk Software

Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

IT Decision Checklist: Security Information and Event Management
sponsored by HP Enterprise Security
EZINE: As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.
Posted: 24 Feb 2012 | Published: 23 Feb 2012

HP Enterprise Security

Deploying desktop virtualization technology in a health care setting
sponsored by Accelera Solutions
EGUIDE: This E-Guide addresses the most important considerations for health care organizations that are planning - or are in the midst of - virtual desktop implementation.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

Accelera Solutions

Optimise the Healthcare Data Centre through Operational Efficiency and Data Resilience
sponsored by Hitachi Vantara
WHITE PAPER: This white paper offers valuable insight into how modern health care facilities can ensure the continuity of operations, even in the face of an unforeseen disaster. Additionally, the ROI associated with a data resilience plan is explored.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Hitachi Vantara

E-Guide: Health care, cloud storage providers and data ownership
sponsored by Intel
EGUIDE: This E-Guide discusses the HIPAA requirements around patient’s access to his or her records as well as issues surrounding data ownership when health care data is stored in the cloud.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Intel

Closed-loop Records Management: The Stakes Are Too High to Ignore
sponsored by RSD
WHITE PAPER: As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

RSD

UCB Gains Efficiencies and Realizes Lower TCO with CallCopy Call Recording
sponsored by NACR
CASE STUDY: Uncover why a implementing a CallCopy recording solution that is easy to use, search, update, support and maintain can offer a lower TCO than other solutions, as well as fulfilling all your call recording needs.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

NACR

Cloud Security Myths and Strategies Uncovered
sponsored by VMware, Inc.
WHITE PAPER: Security and compliance is the most often-cited barrier to cloud adoption. Read what David Hunter, CTO of Platform Security from VMware, and Art Coviello Jr., Executive Chairman of RSA, say about ensuring control and visibility in a secure cloud.
Posted: 11 Jan 2012 | Published: 11 Jan 2012

VMware, Inc.

Usability and Compliance: The Carrots and Sticks that Drive E-Procurement Success
sponsored by Simplifying-IT
WHITE PAPER: Enhancing usability is the key to getting beyond tacit user acceptance of an e-Procurement system to the full adoption and compliance that yields cost reduction and full ROI. Read this paper to learn the full compliance strategies that best-in-class organizations are using for their e-Procurement implementations.
Posted: 09 Jan 2012 | Published: 06 Jan 2012

All resources sponsored by Simplifying-IT

Channel Ezine December
sponsored by IBM
EZINE: How are you expanding your business in the channel in 2012? What areas of specialization are your customers clamoring for? What are you doing to address their needs? Check out this December issue of Channel Strategies and make sure you're on the right track for 2012.
Posted: 19 Dec 2011 | Published: 19 Dec 2011

IBM

Data Centre Energy Efficiency IT Handbook
sponsored by SearchDataCenter.com
EBOOK: The deadline for the UK's Carbon Reduction Commitment scheme has now passed, and companies will begin to receive fines if they can't demonstrate how they've reduced their carbon footprint or are putting processes in place to do so. This expert IT handbook offers detailed information about this new regulation and how organisations can adhere to it.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

SearchDataCenter.com

5 "Need To Knows" : Cloud Archiving for e-Discovery/Compliance
sponsored by FuseMail
EGUIDE: Retrieval requests, such as those associated with e-discovery and compliance, can be a problem for companies and IT managers today. Fortunately, cloud-based archiving is on the rise and can fulfill your compliance demands. Check out this SearchCloudStorage.com E-Guide to learn five “must knows” and more.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

FuseMail

How to Comply with the HPAA Security Rule
sponsored by Redspin, Inc.
EGUIDE: The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Redspin, Inc.

Protecting Vital Business Interests with a Simplified Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: Data growth and regulatory requirements have made backup, recovery, and archiving critical aspects of enterprise operations. Dell Services experts can assess how effectively an information infrastructure is getting the job done and deploy integrated, best-of-breed storage solutions to help ensure the safety and recoverability of critical data.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

DellEMC and Intel®