Research Library

Powered by

Regulatory Compliance Research

  • Information Security Threats: Building Risk Resilience

    Sponsored by:

    Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.

  • 6 Steps to SIEM Success

    Sponsored by: AlienVault

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • October 2013 Health IT E-Zine

    Sponsored by:

    In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.

  • Detecting Security Breaches and APTs with Big Data Security Analytics

    Sponsored by: LogRhythm, Inc.

    This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

  • CARA Meets PCI Requirements and Gains Network Visibility: A Case Study

    Sponsored by: LogRhythm, Inc.

    This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!

  • eBook: Data Security in the E-discovery Process

    Sponsored by: Dell and VMware

    In this e-book from, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.

  • Handbook: Medical Image Archiving

    Sponsored by:

    As more and more information heads online, healthcare providers are struggling to secure and store necessary electronic data. Consult this expert handbook to learn cutting-edge archiving strategies that will help you successfully migrate to the next generation of health IT data systems.

  • Hitting the Information Governance and Compliance Sweet Spot

    Sponsored by: IBM

    In this expert e-guide from, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.

  • Tackling the Data Security Challenge

    Sponsored by: IBM

    In this e-guide, brought to you by, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.

  • Information Governance for Business Value

    Sponsored by: IBM

    In this expert e-guide, brought to you by, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.

  • New standards for certified EHRs drive industry toward coordination

    Sponsored by: HP & Intel®

    This E-guide from discusses the changing requirements of the new EHR certification standards. Read now to learn about the challenges and ways this new criteria will affect both health care providers and EHR vendors.

  • Novartis AG Success Story: How Novartis Increased Disposition Capabilities Ten-fold

    Sponsored by: IBM

    One of the top expenses of healthcare company Novartis is over-retention of records. This case study details the data retention solution they adopted that helped them improve their records management strategy. View now to learn more!

  • BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving

    Sponsored by: IBM

    This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!

  • The Great Firewall of China? How to address the specific challenges of reaching China with your website

    Sponsored by: CDNetworks

    This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • Data Security and Privacy Concerns Pushed into the Spotlight

    Sponsored by: GeoTrust, Inc.

    In this e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.

  • CA Technologies Strategy & Vision for Cloud Identity and Access Management

    Sponsored by: CA Technologies.

    This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!

  • User Provisioning: The Business Imperative

    Sponsored by: CA Technologies.

    Did you know utilizing a comprehensive provisioning tool can help you improve compliance, reduce costs, and improve operational efficiency? Read now to learn more!

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AlienVault

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Reducing the Costs of IT Security Management

    Sponsored by: CA Technologies.

    This resource outlines the IT security management challenges admins today are experiencing and unveils how sound identity and access management (IAM) practices and solutions can resolve many of these issues.

  • Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance

    Sponsored by: Ipswitch File Transfer

    This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.

  • Using EHRs to Achieve Meaningful Use

    Sponsored by:

    As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.

  • Healthcare Networking Classroom

    Sponsored by:

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • Understanding the Data Management Challenges of Dodd-Frank

    Sponsored by: Bloomberg

    Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.

  • How Web Security Improves Productivity and Compliance

    Sponsored by: Webroot

    This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.