Compliance Software Research
-
Quick Dirty Dozen PCI Compliance Simplified
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
-
Understanding the Data Management Challenges of Dodd-Frank
Sponsored by: BloombergJoin industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.
-
Using Predictive Coding to Your E-Discovery Advantage
Sponsored by: TechTarget CIOE-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
-
May Information Security Magazine
Sponsored by: TechTarget SecurityThis month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
-
Enterprise Security: Why you need Effective Log Management
Sponsored by: TechTarget SecurityFor many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
-
IT Services Purchase Intentions 2013
Sponsored by: TechTarget ComputerWeekly.comThis survey of over 130 European IT professionals from Computer Weekly and TechTarget examines company's buying plans for IT services in 2013.
-
Top considerations for manufacturing compliance software
Sponsored by: Epicor Software CorporationThis e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
-
Tripwire Log Center Product Brief
Sponsored by: Tripwire, Inc.Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
-
Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
Sponsored by: Tripwire, Inc.View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
-
Law & The Data Explosion
Sponsored by: Symantec CorporationThis white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
-
Rewriting the Rules of Patch Management
Sponsored by: IBMBy implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
-
Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
Sponsored by: Rapid7Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
-
Computer Weekly - 22 May 2012: Why Tesco is spending £150m online
Sponsored by: TechTarget ComputerWeekly.comThis week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing.
-
Closed-loop Records Management: The Stakes Are Too High to Ignore
Sponsored by: RSDAs the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.
-
Overview of RSD Glass
Sponsored by: RSDThis white paper includes valuable information about information governance along with a solution to many governance challenges.
-
The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach
Sponsored by: Dell SoftwareIn this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.
-
Collab Net Success Story
Sponsored by: CollabNetDiscover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.
-
Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
Sponsored by: Mainline Information SystemsThis presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
-
BDNA for Security: Strengthened Security Through Visibility
Sponsored by: BDNALack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
-
Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance
Sponsored by: Oracle CorporationWhen organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.
-
E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
Sponsored by: IBMThis e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
-
Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company
Sponsored by: IBMInfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today.
-
E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: Safestone TechnologiesThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
End-to-End Secure Client to Cloud Access
Sponsored by: IntelIn this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
-
The Ten Best Practices for Secure Software Development
Sponsored by: ISC2Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software.