ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulatory ComplianceResearch

  • Global profiles of the fraudster

    Sponsored by: ComputerWeekly.com

    Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.

  • Financial Management: At Home in the Cloud

    Sponsored by: Oracle Corporation

    This resource introduces Oracle's cloud-based financial management service as an answer to your growing financial process questions. Read on to uncover key benefits you can gain – including real-time access to financial data, a reduction in transaction costs and errors, and more.

  • Six Steps to SIEM Success

    Sponsored by: AlienVault

    In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • October 2013 Health IT E-Zine

    Sponsored by: SearchHealthIT.com

    In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.

  • IT, IG and Compliance: The New World Order for Data Management

    Sponsored by: SearchCompliance.com

    Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.

  • Automation Suite for NERC CIP Compliance

    Sponsored by: LogRhythm, Inc.

    Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.

  • Tapping Big Data Security Analytics to Detect Breaches & Advanced Threats

    Sponsored by: LogRhythm, Inc.

    This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

  • Ease GLBA Compliance with LogRhythm

    Sponsored by: LogRhythm, Inc.

    Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.

  • CARA Meets PCI Requirements and Gains Network Visibility: A Case Study

    Sponsored by: LogRhythm, Inc.

    This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!

  • Security Intelligence: Ensure Compliance, Optimize Performance, Boost Security

    Sponsored by: LogRhythm, Inc.

    Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.

  • PCI and PA DSS Compliance Assurance with LogRhythm

    Sponsored by: LogRhythm, Inc.

    Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.

  • Leverage Security Intelligence for Energy and Utilities Companies

    Sponsored by: IBM

    Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.

  • Boosting Enterprise Security with Integrated Log Management

    Sponsored by: IBM

    Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.

  • EDRM & IGRM: From E-Discovery to Information Governance

    Sponsored by: SearchCompliance.com

    In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.

  • Handbook: Medical Image Archiving

    Sponsored by: SearchHealthIT.com

    As more and more information heads online, healthcare providers are struggling to secure and store necessary electronic data. Consult this expert handbook to learn cutting-edge archiving strategies that will help you successfully migrate to the next generation of health IT data systems.

  • Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP

    Sponsored by: Hewlett-Packard Limited

    This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets.

  • Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act

    Sponsored by: Absolute Software

    This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.

  • Million Dollar HIPAA Penalties for Healthcare

    Sponsored by: Absolute Software

    The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.

  • Flash: Maximo Asset Management for Healthcare Organizations

    Sponsored by: IBM

    This brief video describes an asset management tool that can help you meet the challenges of an evolving healthcare landscape. Tune in to learn how you can increase productivity and asset utilization, manage compliance, lower costs, and more.

  • A Prescription for IT Efficiency

    Sponsored by: Dell, Inc. and Windows 8 Pro

    This resource examines new risks and threats that are making Windows XP unsafe for use in a healthcare setting, and details the essential security capabilities and benefits offered by Windows 7 and Windows 8.

  • Reducing the costs and risks of data storage in the federal government

    Sponsored by: IBM

    This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.

  • eBook: Data Security in the E-discovery Process

    Sponsored by: Dell and VMware

    In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.

  • Hitting the Information Governance and Compliance Sweet Spot

    Sponsored by: IBM

    In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.

  • Tackling the Data Security Challenge

    Sponsored by: IBM

    In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.

  • Information Governance for Business Value

    Sponsored by: IBM

    In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.