Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Security Compliance

RSS Feed   
Security Compliance Reports
 
2018: Snapshot of the Most Important Worldwide Cybersecurity Laws, Regulations, Directives and Standards
sponsored by Radware
RESOURCE: Are you out of breath from the breakneck pace of cyberattacks since the start of 2018? Inside, learn how regulators are stepping in to drive meaningful action, and take an in depth look at 10 noteworthy cybersecurity laws, regulations, directives and standards.
Posted: 21 Jun 2018 | Published: 05 Jun 2018

Radware

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

User Provisioning: The Business Imperative
sponsored by CA Technologies.
WHITE PAPER: Did you know utilizing a comprehensive provisioning tool can help you improve compliance, reduce costs, and improve operational efficiency? Read now to learn more!
Posted: 15 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Data Center Designs to Help Meet Your Compliance Challenge
sponsored by Iron Mountain
WHITE PAPER: This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
sponsored by IBM and SI Architects
EGUIDE: In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

IT Handbook: Getting Over the Cloud Adoption Hurdle
sponsored by SearchCloudComputing.com
EGUIDE: This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchCloudComputing.com

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

Meeting Solvency II 'Full Measures' XBRL Reporting Requirements and More
sponsored by IBM
WHITE PAPER: Explore this white paper to discover technology that can enable you to minimize complexity caused by requirements of regulations like the Solvency II mandate while improving efficiency at the same time. Learn how you can reduce process risks, costs, and data inaccuracies that stem from manual reporting processes.
Posted: 28 Jul 2016 | Published: 31 Dec 2015

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement