Research Library

Powered by

Regulatory Compliance Research

  • Information Security Threats: Building Risk Resilience

    Sponsored by:

    Enterprises need an agile risk management strategy to deal with today's evolving threats. Read this expert E-Guide and discover the correct ways to build up your organizations risk resilience against these ever growing threats.

  • Secure Web Gateway Overview: Implementation Best Practices

    Sponsored by:

    This E-Guide from unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!

  • After Antimalware: Moving Toward Endpoint Antivirus Alternatives

    Sponsored by:

    This E-Guide from outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.

  • PCI Council issues mobile application rules for software developers

    Sponsored by:

    The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.

  • 6 Point SIEM Solution Evaluation Checklist

    Sponsored by:

    This E-Guide from explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!

  • Financial process automation leads to better performance

    Sponsored by: SearchFinancialApplications

    Financial reporting can be time-consuming and expensive if done manually. In this expert guide, learn how automating financial reporting can offer your organization key benefits and discover recommendations on how to get started.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AlienVault

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Reducing the Costs of IT Security Management

    Sponsored by: CA Technologies.

    This resource outlines the IT security management challenges admins today are experiencing and unveils how sound identity and access management (IAM) practices and solutions can resolve many of these issues.

  • Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance

    Sponsored by: Ipswitch File Transfer

    This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.

  • Using EHRs to Achieve Meaningful Use

    Sponsored by:

    As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.

  • Healthcare Networking Classroom

    Sponsored by:

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • Understanding the Data Management Challenges of Dodd-Frank

    Sponsored by: Bloomberg

    Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.

  • How Web Security Improves Productivity and Compliance

    Sponsored by: Webroot

    This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

  • How Web Security Improves Productivity and Compliance

    Sponsored by: Webroot

    This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

  • Identity and Access Management Security Live Chat Transcript

    Sponsored by: SailPoint Technologies

    In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.

  • May Information Security Magazine

    Sponsored by:

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • Build Your Identity And Access Management Strategy

    Sponsored by: Symplified

    This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.

  • PhoneFactor Case Study: Fredrikson & Byron, P.A.

    Sponsored by: PhoneFactor

    Discover how phone-based authentication helped a global law firm ensure that their on-the-go attorneys received secure access to client data and communications without compromising the safety of the confidential information.

  • The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods

    Sponsored by: Attachmate Corporation

    This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach.

  • Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit

    Sponsored by: Attachmate Corporation

    This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!

  • The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate

    Sponsored by: Attachmate Corporation

    Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution.

  • Controlling the Cost of File Transfers

    Sponsored by: Attachmate Corporation

    View this resource to learn about a family of managed solutions that can help you meet the file transfer needs of your enterprise without the costly, resource-hungry investment of a homegrown solution.

  • File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement

    Sponsored by: Attachmate Corporation

    Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more!

  • SAP data archiving: The keys to a successful project revealed

    Sponsored by: Dolphin

    In this expert E-Book, find practical advice for developing an SAP data archiving strategy, and learn how this approach can help you better manage data volumes while meeting compliance and e-discovery requirements.

  • Cloud Compliance Technical Guide

    Sponsored by:

    Check out this expert technical guide for a global perspective on emerging cloud compliance issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.