eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK:
In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011
|
|
|
Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE:
This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013
|
|
|
Tips to Develop the Right Retention Schedule for your Organization
sponsored by TechTarget CIO
EBOOK:
Check in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
Posted: 18 Jul 2013 | Published: 18 Jul 2013
|
|
|
Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST:
Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013
|
|
|
Understanding the Data Management Challenges of Dodd-Frank
sponsored by Bloomberg
PRESENTATION TRANSCRIPT:
Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.
Posted: 03 Jun 2013 | Published: 03 Jun 2013
|
|
|
Using Predictive Coding to Your E-Discovery Advantage
sponsored by TechTarget CIO
EZINE:
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013
|
|
|
May Information Security Magazine
sponsored by TechTarget Security
EZINE:
This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013
|
|
|
Enterprise Security: Why you need Effective Log Management
sponsored by TechTarget Security
EBOOK:
For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013
|
|
|
IT Services Purchase Intentions 2013
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This survey of over 130 European IT professionals from Computer Weekly and TechTarget examines company's buying plans for IT services in 2013.
Posted: 24 Jan 2013 | Published: 24 Jan 2013
|
|
|
Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE:
This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012
|
|
|
Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER:
Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012
|
|
|
Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER:
View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012
|
|
|
Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER:
This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010
|
|
|
Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER:
By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011
|
|
|
Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER:
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012
|
|
|
Computer Weekly - 22 May 2012: Why Tesco is spending £150m online
sponsored by TechTarget ComputerWeekly.com
EZINE:
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing.
Posted: 21 May 2012 | Published: 22 May 2012
|
|
|
Closed-loop Records Management: The Stakes Are Too High to Ignore
sponsored by RSD
WHITE PAPER:
As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.
Posted: 15 Feb 2012 | Published: 15 Feb 2012
|
|
|
Overview of RSD Glass
sponsored by RSD
WHITE PAPER:
This white paper includes valuable information about information governance along with a solution to many governance challenges.
Posted: 03 Oct 2011 | Published: 03 Oct 2011
|
|
|
The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
sponsored by Dell Software
WHITE PAPER:
In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
Posted: 31 Aug 2011 | Published: 30 Aug 2011
|
|
|
Collab Net Success Story
sponsored by CollabNet
CASE STUDY:
Discover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.
Posted: 27 Jul 2011 | Published: 27 Jul 2011
|
|
|
Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
sponsored by Mainline Information Systems
PRESENTATION TRANSCRIPT:
This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
Posted: 17 Jun 2011 | Published: 16 Jun 2011
|
|
|
BDNA for Security: Strengthened Security Through Visibility
sponsored by BDNA
WHITE PAPER:
Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
Posted: 07 Jun 2011 | Published: 07 Jun 2011
|
|
|
Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance
sponsored by Oracle Corporation
WHITE PAPER:
When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.
Posted: 11 May 2011 | Published: 11 May 2011
|
|
|
E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
sponsored by IBM
EGUIDE:
This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
Posted: 22 Mar 2011 | Published: 22 Mar 2011
|
|
|
Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company
sponsored by IBM
CASE STUDY:
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today.
Posted: 17 Mar 2011 | Published: 17 Mar 2011
|
|