Software  >   Applications Software  >   Enterprise Applications Software  >  

Security Compliance Software

RSS Feed   
Security Compliance Software Reports
 
The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day
sponsored by Smarsh
RESOURCE: Learn how you can handle operational, market, compliance and reputation concerns, and why it is important to get a good handle on your company's electronic communications data.
Posted: 09 May 2018 | Published: 09 May 2018

Smarsh

Seamless Transition to CUI Markings
sponsored by TITUS
PRODUCT OVERVIEW: While it is critical to set standardized controls for the way information is handled, the process of implementing CUI markings is complex, time-consuming, and sometimes unclear. In this solution brief, learn how Titus data protection solutions can help organizations to ensure they meet CUI requirements.
Posted: 02 Aug 2019 | Published: 30 Jun 2019

TITUS

The Digital Nexus in Banking
sponsored by Hitachi Vantara
EBOOK: With Hitachi, achieving the level of regulatory compliance your business needs become a lot easier while managing data becomes less of an arduous task. To learn about the 3 major benefits of managing data with Hitachi and to go over the provided compliance maturity checklist, read this e-book.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Hitachi Vantara

Can You Handle Your Data?
sponsored by TITUS
WHITE PAPER: The modern world is swimming in data, with no signs of that changing any time soon. Threats to the security of all this data have grown in number and sophistication, meaning data regulations are more complicated than ever. In this white paper, learn how organizations can improve information handling practices to better protect their sensitive data.
Posted: 14 May 2019 | Published: 31 Jan 2019

TITUS

Taking Your Business in a New Direction
sponsored by Avalara
WHITE PAPER: Download this paper to explore how shifting products and sales channels can impact tax compliance — as well as best practices to successfully navigate these changeswhile minimizing risk.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Avalara

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

The SOX Effect
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchCompliance.com

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Facing up to emerging technology: Risks and benefits
sponsored by SearchCIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

SearchCIO

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info