Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER:
Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010
|
|
|
FISMA Compliance: A Holistic Approach to FISMA and Information Security
sponsored by IBM
WHITE PAPER:
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
Posted: 10 Jan 2011 | Published: 10 Jan 2011
|
|
|
Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER:
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009
|
|
|
Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance
sponsored by Silver Tail Systems
EGUIDE:
This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.
Posted: 22 Feb 2011 | Published: 22 Feb 2011
|
|
|
The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER:
This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011
|
|
|
Protecting Critical Data is a Main Priority for the U.S. Army
sponsored by Globalscape
CASE STUDY:
In this white paper, learn how the U.S. Army can protect their $68 billion-worth of annual data with a set of security solutions that easily integrate with their Standard Army Management Information System (STAMIS).
Posted: 22 May 2014 | Published: 31 Dec 2013
|
|
|
June Issue of Information Security magazine: Mobile Security: A New Game Plan
sponsored by Information Security Magazine
EZINE:
This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges.
Posted: 02 Jun 2011 | Published: 02 Jun 2011
|
|
|
How to Build a Strong Business Case for Your Supply Chain Technology Investment
sponsored by GIB
WHITE PAPER:
Download this guide which provides 9 ways for you to evaluate and pitch the benefits of a potential supply chain tech investment to your decision stakeholders.
Posted: 22 Nov 2019 | Published: 22 Nov 2019
|
|
|
Get The Most From Your AI Investment By Operationalizing Analytics
sponsored by SAS
WHITE PAPER:
Many organizations blindly approach their analytics without ever aligning them with business goals and KPIs. Download this AI analytics guide, which dives into 7 steps to fully operationalize your analytics, and how to get the most out of AI analytics.
Posted: 09 Dec 2019 | Published: 09 Dec 2019
|
|
|
5 Principles for Enterprise Architects
sponsored by Mendix
WHITE PAPER:
The emergence of wide-ranging tools like cloud, mobile IoT, and analytics has put organizations in a place where they need personnel to effectively lead the implementation. Download the 5 principles of a strong enterprise architect in order to understand digital priorities and how to support them.
Posted: 12 Nov 2019 | Published: 12 Nov 2019
|
|
|
|
|