ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulatory Compliance Research

  • 6 Point SIEM Solution Evaluation Checklist

    Sponsored by: TechTarget Security

    This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!

  • New SaaS Identity Access Management Tools Emerge, Outdo Legacy IAM

    Sponsored by: TechTarget Security

    This expert E-Guide explains the necessary evolution of identity and access management (IAM) tools and details the difference of IAM for cloud-based applications vs. on-premise applications.

  • Aligning Enterprise Identity and Access Management with CIO Priorities

    Sponsored by: TechTarget Security

    In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.

  • Weighing the Risks, Challenges and Benefits Before Diving into BYOD

    Sponsored by: TechTarget Security

    This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    Sponsored by: TechTarget Security

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  • BYOD Security Policy Considerations and Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.

  • July Essentials Guide on Cloud Computing

    Sponsored by: TechTarget Security

    This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: TechTarget Security

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • PCI in the cloud: Compliance guide

    Sponsored by: TechTarget Security

    Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.

  • The Need for Cloud Computing Security Standards

    Sponsored by: TechTarget Security

    While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.

  • SAP data archiving: The keys to a successful project revealed

    Sponsored by: Dolphin

    In this expert E-Book, find practical advice for developing an SAP data archiving strategy, and learn how this approach can help you better manage data volumes while meeting compliance and e-discovery requirements.

  • Cloud Compliance Technical Guide

    Sponsored by: TechTarget Security

    Check out this expert technical guide for a global perspective on emerging cloud compliance issues.

  • IT Handbook: Getting Over the Cloud Adoption Hurdle

    Sponsored by: TechTarget Cloud Computing

    This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.

  • Recognizing the Value of Data Management in the Financial Sector

    Sponsored by: Bloomberg

    The combination of poor reference data management and the Dodd-Frank Wall Street Reform and Consumer Protection Act is creating a data management mess for many in the financial sector. Access this expert resource to explore how organizations can start preparing to meet new compliance regulations and increase data transparency.

  • Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements

    Sponsored by: IBM and SI Architects

    This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.

  • Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN

    Sponsored by: IBM and SI Architects

    In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.

  • How to Manage Secure File Transfers to Meet Compliance Requirements

    Sponsored by: IBM and SI Architects

    This expert eGuide will help you learn how to maintain a balance between functionality and security when it comes to wide area network (WAN) file transfers. IT expert Dan Sullivan answers questions about WAN management and how to ensure secure transfers.

  • Sustainability: From Strategic Objective to Compliance Operation

    Sponsored by: HP & Intel®

    This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.

  • E-Discovery Cloud Considerations

    Sponsored by: Symantec Corporation

    In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.

  • Secure Web Gateway Overview: Implementation Best Practices

    Sponsored by: Sophos

    This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.

  • Presentation Transcript: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.

  • Holistic risk management: Perspectives for IT professionals

    Sponsored by: IBM

    Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.

  • Compliance Driven Security

    Sponsored by: DellEMC and Intel®

    With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.

  • The changing SIEM landscape: What you should know to stay ahead

    Sponsored by: TechTarget Security

    While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.

  • Smarter Customers, Smarter Commerce: Innovations in the Banking Industry

    Sponsored by: IBM

    Banks today must reassess their business models and focus more on efficiency, data collection and risk management in order to stay competitive. Uncover a unique framework that can help meet your business objectives and allow for better data management in the highly regulated financial industry.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.