Regulatory Compliance Research
-
Rebuilding the Banking Landscape: Restoring Customer Confidence and Returning to Growth
Sponsored by: Micro Focus, LtdThis paper looks at the ways that banks are having to adapt to rise to these challenges, the constraints they face and how innovative changes in IT infrastructure can release time, money and capacity to meet the demands of the new banking landscape.
-
When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure
Sponsored by: Trend Micro, Inc.Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more.
-
E-Guide: Information Security Essential Guide to Compliance
Sponsored by: Information Security MagazineCompliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
-
The State of Privacy and Data Security Compliance
Sponsored by: SophosThe purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.
-
Securing Virtualised Environments and Accelerating Cloud Computing
Sponsored by: CA TechnologiesThere is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.
-
Global Trends in Sustainability Performance Management
Sponsored by: SAP America, Inc.This paper will present an overview of the changing landscape as companies develop practices and processes to measure their performance as sustainable enterprises. It will examine the complex new drivers of sustainability reporting, as well as the rapidly changing legislative environment that will make reporting mandatory, not voluntary.
-
Why Should Companies Take a Closer Look at Business Continuity Planning?
Sponsored by: DatalinkOver the last 30 years, companies have significantly changed their approach to ensuring that their businesses can continue to run in the event of a catastrophe. Read this white paper to learn how business continuity and disaster recovery solutions can help you to develop a more robust enterprise.
-
Solving Four Primary Security Challenges of Microsoft SharePoint
Sponsored by: Sophos UKThis white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.
-
Scaling Scrum: Lessons from the Trenches
Sponsored by: IBMCheck out this webcast to learn how the Agile Scaling Model can be applied to tailor the Scrum lifecycle, roles, and practices to address scaling factors, including regulatory compliance, technical complexity, and organizational complexity.
-
PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
Sponsored by: IBMHigh transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
-
A Virtualization Roadmap from Dell and Intel
Sponsored by: DellEMC and Intel®Virtualization is more than a technology. It is a way of thinking about problems that allow us to go beyond the physical limitations normally associated with entire classes of hardware, from servers to storage. Attaining the maximum benefits of virtualization, however, requires a plan and constant monitoring to ensure peak performance.
-
Five Challenges to Continuous PCI DSS Compliance
Sponsored by: Tripwire, Inc.As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.
-
Log Management Best Practices
Sponsored by: Hewlett Packard EnterpriseIn this presentation transcript, find out best practices in log management and how it affects the use of security dashboards. Also learn how log management differs from security information and event management (SIEM).
-
Pulling the Plug on Legacy Log Management
Sponsored by: Tripwire, Inc.When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh.
-
Presentation Transcript: Building a Comprehensive Notes/Domino Archiving Strategy
Sponsored by: Sherpa SoftwareThis presentation transcript explains why archiving Domino content (including email and applications) is necessary for most companies. Learn about current archiving tool trends and best practices for Domino. Discover how to enlist a strategy that will best fit your organization's archiving needs.
-
Secure File Transfer Solution Saves Bank Time and Money
Sponsored by: Linoma SoftwareIntegra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.
-
Presentation Transcript: College of Virtualization - Lessons in Creating a Virtual Infrastructure for Cloud Computing
Sponsored by: Dell and VMwareThis presentation transcript discusses the steps essential for creating a virtual infrastructure for cloud computing to improve the delivery of data center applications.
-
Virtualization Security: Achieving Compliance for the Virtual Infrastructure
Sponsored by: Trend MicroWhat’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. Read this paper to learn about top trends in virtualization security, how virtualization poses unique challenges to compliance, and more!
-
Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers?
Sponsored by: Guardium, an IBM CompanyThis Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program.
-
Presentation Transcript: College of Virtualization - Lessons in Integrating Data Protection Software
Sponsored by: Dell and VMwareIn this SearchStorage.com presentation transcript, you'll see an overview of data protection software. You'll recieve some general advice, business and technology considerations, as well as some deployment considerations and configurations.
-
Beyond FTP: Securing and Managing File Transfers
Sponsored by: Linoma SoftwareEvery day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol.
-
Presentation Transcript: SMB Server School - Considerations for Integrating Windows Server into a Virtual Environment
Sponsored by: Dell, Inc. and Intel®This transcript explores the virtualization benefits of implementing Windows Server 2008 R2 in your organization. Receive best practices on how to effectively integrate R2 into your current infrastructure. Discover how this integration can enable your organization to increase the performance and reliability of its virtualized environment.
-
E-Book: IT in the Electronic Hospital
Sponsored by: ImprivataThe federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.
-
Presentation Transcript: Enabling The Business Governance Of Data
Sponsored by: ASG Software SolutionsIn this presentation transcript, Scott McCurdy, SVP of Business Solutions at ASG and featured guest Rob Karel, Principal Analyst at Forrester Research, discuss how enterprises are linking technical metadata to the formal management of business terms to achieve true enterprise data governance.
-
Information Security Magazine - February 2010: Under Control
Sponsored by: Information Security MagazineFeature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.