ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulatory Compliance Multimedia

  • Best practices in managing requirements in Energy and Utilities industries

    Sponsored by: IBM

    This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.

  • Welcome to Iron Mountain’s National Data Center

    Sponsored by: Iron Mountain

    This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.

  • Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10

    Sponsored by: BlackBerry

    This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.

  • Million Dollar HIPAA Penalties for Healthcare

    Sponsored by: Absolute

    The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.

  • Flash: Maximo Asset Management for Healthcare Organizations

    Sponsored by: IBM

    This brief video describes an asset management tool that can help you meet the challenges of an evolving healthcare landscape. Tune in to learn how you can increase productivity and asset utilization, manage compliance, lower costs, and more.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • Detecting Security Breaches and APTs with Big Data Security Analytics

    Sponsored by: LogRhythm, Inc.

    This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Healthcare Networking Classroom

    Sponsored by: TechTarget Health IT

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    Sponsored by: ArcSight, an HP Company

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • Test and simulate rules using WebSphere ILOG Business Rules Management System

    Sponsored by: IBM

    Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.

  • Webcast: Active Directory Recovery with Windows Server 2008 R2

    Sponsored by: Dell Software

    In this new Quest on-demand webcast, get a peek at the Active Directory Recycle Bin in action. Then, find out how a powerful third-party solution simplifies the entire recovery process to not only quickly and easily restore deleted objects, but to roll back attributes too.

  • Scaling Scrum: Lessons from the Trenches

    Sponsored by: IBM

    Check out this webcast to learn how the Agile Scaling Model can be applied to tailor the Scrum lifecycle, roles, and practices to address scaling factors, including regulatory compliance, technical complexity, and organizational complexity.

  • PCI Compliant Yesterday. Still Compliant Today?

    Sponsored by: Tripwire, Inc.

    This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.

  • LogRhythm 3-Minute Product Demo

    Sponsored by: LogRhythm, Inc.

    This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.

  • PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    Sponsored by: Tripwire, Inc.

    What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.

  • SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution

    Sponsored by: Tripwire, Inc.

    SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • InterScan Messaging Hosted Security (IMHS) Trial

    Sponsored by: Trend Micro, Inc.

    Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Efficient SAN Based Tape Encryption with Curtis Preston

    Sponsored by: Cisco Systems, Inc.

    Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.

  • Ensure Data Protection with Sun StorageTek T10000B Tape Drives

    Sponsored by: Sun StorageTek

    Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.

  • Shouldn't Single Sign-on Be Child's Play?

    Sponsored by: Microsoft & Quest Software

    Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.

  • Email management suite

    Sponsored by: Iron Mountain

    Email management solutions are designed to simplify your email management complexities. In this brief Videocast, legendary British comic, John Cleese, explains why you should want a total email management suite.

  • Symantec Protection Network and Online Backup: An Executive Overview

    Sponsored by: Symantec Corporation

    In this podcast, Sr. Manager of Product Management, Mike Baldwin, provides an overview of the Symantec Protection Network and the Online Backup offering of the newly launched Symantec service.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.