ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulatory ComplianceResearch

  • 6 Steps to SIEM Success

    Sponsored by: AlienVault

    In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • October 2013 Health IT E-Zine

    Sponsored by: SearchHealthIT.com

    In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.

  • Automation Suite for NERC CIP Compliance

    Sponsored by: LogRhythm, Inc.

    Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.

  • Detecting Security Breaches and APTs with Big Data Security Analytics

    Sponsored by: LogRhythm, Inc.

    This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

  • Simplifying your Compliance Strategy

    Sponsored by: LogRhythm, Inc.

    Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.

  • CARA Meets PCI Requirements and Gains Network Visibility: A Case Study

    Sponsored by: LogRhythm, Inc.

    This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!

  • SIEM Optimization: Ensuring Compliance and Security

    Sponsored by: LogRhythm, Inc.

    Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.

  • PCI and PA DSS Compliance Assurance with LogRhythm

    Sponsored by: LogRhythm, Inc.

    Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.

  • Leverage Security Intelligence for Energy and Utilities Companies

    Sponsored by: IBM

    Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.

  • Boosting Enterprise Security with Integrated Log Management

    Sponsored by: IBM

    Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.

  • The Need for Data Loss Prevention Now

    Sponsored by: Clearswift

    This resource takes a deep look at why data leakage prevention (DLP) is so vital to data protection, explains the multiple ways data can leak out of your enterprise, and outlines a five-step approach to reaching DLP nirvana.

  • EDRM & IGRM: From E-Discovery to Information Governance

    Sponsored by: SearchCompliance.com

    In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.

  • Handbook: Medical Image Archiving

    Sponsored by: SearchHealthIT.com

    As more and more information heads online, healthcare providers are struggling to secure and store necessary electronic data. Consult this expert handbook to learn cutting-edge archiving strategies that will help you successfully migrate to the next generation of health IT data systems.

  • BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving

    Sponsored by: IBM

    This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • CA Technologies Strategy & Vision for Cloud Identity and Access Management

    Sponsored by: CA Technologies.

    This resource details a cloud-based identity and access management (IAM) solution designed to secure access to cloud-based services and apps, simplify IAM both on-premises and in the cloud, and improve efficiency. View now to learn more!

  • Reducing the costs and risks of data storage in the federal government

    Sponsored by: IBM

    This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.

  • eBook: Data Security in the E-discovery Process

    Sponsored by: Dell and VMware

    In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.

  • Hitting the Information Governance and Compliance Sweet Spot

    Sponsored by: IBM

    In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.

  • Tackling the Data Security Challenge

    Sponsored by: IBM

    In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.

  • Information Governance for Business Value

    Sponsored by: IBM

    In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.

  • New standards for certified EHRs drive industry toward coordination

    Sponsored by: HP & Intel®

    This E-guide from SearchHealthIT.com discusses the changing requirements of the new EHR certification standards. Read now to learn about the challenges and ways this new criteria will affect both health care providers and EHR vendors.

  • Novartis AG Success Story: How Novartis Increased Disposition Capabilities Ten-fold

    Sponsored by: IBM

    One of the top expenses of healthcare company Novartis is over-retention of records. This case study details the data retention solution they adopted that helped them improve their records management strategy. View now to learn more!

  • The Great Firewall of China? How to address the specific challenges of reaching China with your website

    Sponsored by: CDNetworks

    This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.

  • Data Security and Privacy Concerns Pushed into the Spotlight

    Sponsored by: GeoTrust, Inc.

    In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.