IT Management  >   Systems Operations  >  

IT Compliance

RSS Feed   
IT Compliance Reports
 
The Critical Role Data Access Plays in Support of GDPR
sponsored by Gigamon
WHITE PAPER: Visibility into network data, wherever it resides, is foundational to maintaining GDPR compliance. Download this white paper for specific examples of where and how this applies to various articles within the regulation.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint

Miles & Stockbridge Simplify eDiscovery, Backup and DR
sponsored by ClearSky Data
CASE STUDY: With their NAS system struggling to keep up, Miles & Stockbridge sought out alternatives. Read their study to see how they're now able to simplify their eDiscovery processes, protect 170 VMs, and satisfy ISO certification requirements with a scalable backup and DR solution.
Posted: 17 Apr 2019 | Published: 31 Dec 2018

ClearSky Data

Re-architecting Data Protection Infrastructure for Hybrid IT
sponsored by Rubrik
EBOOK: This e-book will help you prepare to evolve your data protection infrastructure, including coverage on how to reduce data protection TCO (without compromising security), rethinking backup for ransomware and GDPR policies, and why the cloud holds much promise for data protection.
Posted: 07 Jan 2019 | Published: 07 Jan 2019

Rubrik

10 Best Practices for Data Archiving and Application Decommissioning
sponsored by Flatirons Digital Innovations
WHITE PAPER: To learn how to successfully archive and decommission legacy applications, download this paper. It shares 10 proven practices to help you in the process while avoiding common pitfalls.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Flatirons Digital Innovations

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
RESOURCE: Ready for SIEM deployment? Whether your goals are to detect threats, achieve compliance, or fuel incident response, these 6 steps to SIEM success will guide your team through key considerations to choose a SIEM platform that will work for your environment.
Posted: 31 Jul 2018 | Published: 30 Jun 2017

AT&T Cybersecurity

Implementing General Data Protection Regulation in SAP Environments
sponsored by Attunity
WHITE PAPER: While the GDPR regulations are broad and thorough, they are open to interpretation and lack speci´Čücity regarding implementation. Download this white paper to learn how to implement the compliance policies in your SAP environment, today.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Attunity

Why Homomorphic Encryption Alone is Security, Not Privacy
sponsored by Immuta, Inc
WHITE PAPER: If privacy is your goal, carefully consider the differences between privacy techniques and security techniques. Privacy can be improved with techniques like differential privacy and homomorphic encryption, but for totally different reasons. Read on to learn more.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Immuta, Inc

Partners Healthcare Turns to ClearSky Data for an All-in-one Storage Solution
sponsored by ClearSky Data
CASE STUDY: Download this study to discover how you can benefit, just as Partners HealthCare, the largest healthcare system in Massachusetts, did from employing an all-in-one backup solution to establish compliant data encryption, improve audit logging, and expand storage capacity as needs grow.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

ClearSky Data

Endpoint Security Management: Beyond Antivirus
sponsored by SearchSecurity.com
EBOOK: Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement