Novell® Sentinel: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER:
Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
Posted: 06 Oct 2009 | Published: 06 Oct 2009
|
|
|
Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER:
The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009
|
|
|
Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER:
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009
|
|
|
Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance
sponsored by Skybox Security
PRESENTATION TRANSCRIPT:
PCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues.
Posted: 02 Oct 2009 | Published: 02 Oct 2009
|
|
|
Sustainability Matters: Why - and how - business is widening its focus to consider the needs of stakeholders
sponsored by Oracle Corporation
WHITE PAPER:
This white paper demonstrates how running a responsible business and high levels of performance do not have to work against each other. And it makes a case for why sustainability issues should simply be part of a company’s overall performance management practices.
Posted: 15 Sep 2009 | Published: 01 Dec 2008
|
|
|
Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE:
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009
|
|
|
Email Archiving: Planning, Policies and Product Selection - Chapter 3
sponsored by TechTarget Search Windows Server
EBOOK:
It's critical to identify the key features when selecting an email-archiving system for risk reduction. The most important part of the process is defining the company's email-retention goals and policies. This chapter will discuss several tips for choosing the proper email-archiving product features for your organization.
Posted: 14 Sep 2009 | Published: 14 Sep 2009
|
|
|
LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO:
This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009
|
|
|
LogRhythm and PCI Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER:
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.
Posted: 09 Sep 2009 | Published: 09 Sep 2009
|
|
|
The Path to IFRS Conversion: Considerations for the banking and capital markets industry
sponsored by Deloitte
WHITE PAPER:
As acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009
|
|
|
Leveraging a Maturity Model to Achieve “Proactive Compliance”
sponsored by Symantec Corporation
WHITE PAPER:
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model.
Posted: 02 Sep 2009 | Published: 03 Aug 2009
|
|
|
PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST:
What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009
|
|
|
SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
WEBCAST:
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009
|
|
|
Presentation Transcript: A Look at Hosted Exchange and Hosted Email
sponsored by USA.NET, Inc.
PRESENTATION TRANSCRIPT:
Nowadays, more and more IT shops are considering hosted Exchange services rather than running their mail server locally. They need to decide whether or not it is right for their company. Take a deeper look at hosted Exchange and hybrid models in this presentation transcript of the 'A Look at Hosted Exchange and Hosted Email' webcast.
Posted: 26 Aug 2009 | Published: 01 Aug 2009
|
|
|
Authentication in the Enterprise: Current and Changing Requirements
sponsored by PistolStar, Inc.
WHITE PAPER:
This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
Posted: 25 Aug 2009 | Published: 25 Aug 2009
|
|
|
InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD:
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009
|
|
|
InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD:
Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009
|
|
|
Achieving PCI Compliance with Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER:
While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis.
Posted: 20 Aug 2009 | Published: 19 Aug 2009
|
|
|
Information Governance Perspectives from RSD: E-mail Archiving
sponsored by RSD
WHITE PAPER:
With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions
Posted: 17 Aug 2009 | Published: 17 Aug 2009
|
|
|
Why "Free" Patch Management Tools Could Cost You More
sponsored by Lumension
WHITE PAPER:
While "free" tools appear to be an enticing solution for patch management, looking deeper into the needs of the organization leads to selection of a more complete patch management solution which results in reduced long-term risk and optimized operating expense.
Posted: 12 Aug 2009 | Published: 01 Nov 2008
|
|
|
Presentation Transcript: Reduce IT Costs by Rationalizing Your Application Portfolio
sponsored by Informatica Corporation
PRESENTATION TRANSCRIPT:
Read this presentation transcript of the webcast "Reduce IT Costs by Rationalizing Your Application Portfolio" to learn the best practices of application retirement and how to effectively retire legacy applications and reduce IT costs while still having the ability to simply and efficiently access the retired data.
Posted: 10 Aug 2009 | Published: 10 Aug 2009
|
|
|
eBook-- Defining an Email-Archiving Policy
sponsored by Symantec Corporation
EBOOK:
Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
Posted: 09 Jul 2009 | Published: 09 Jul 2009
|
|
|
Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT:
Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.
Posted: 29 Jun 2009 | Published: 29 Jun 2009
|
|
|
The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK:
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009
|
|
|
Embracing the Cloud: Top Seven Imperatives for an Organization
sponsored by Wipro
WHITE PAPER:
This paper analyzes the impact of the cloud on the IT Ecosystem and provides answers to what an organization needs to do in embracing a right cloud strategy.
Posted: 12 Jun 2009 | Published: 01 Mar 2009
|
|