Research Library

Powered by

Compliance (Systems Operations) Research

  • Disaster Recovery with Pure Cloud Block Store

    Sponsored by: Pure Storage

    Access this data sheet for an overview of common risk management challenges, learn how disaster recovery in the cloud can help, and examine a case study that brings it all into the real world.

  • 5 Steps to Determine Residual Risk During the Assessment Process

    Sponsored by: Coalfire

    Governance, risk and compliance-related residual risks are risk factors left over after an organization applies security controls to ensure compliance with laws and regulations. Data management gaps create this risk, but spotting it isn’t impossible. Open this article for 5 steps to identifying and offsetting residual risk during an assessment.

  • Achieving Audit-Readiness for Security Standards Compliance in Modern IT Environments

    Sponsored by: Xtravirt

    Modern IT environments are highly complex and staying compliant with security standards can be time-consuming. Download this white paper and discover how your organization can achieve audit readiness, ensure continuity of service, and earn customer trust. Read Now.

  • Cybersecurity Compliance Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.

  • Learn How Atlassian’s Security Leadership Team Ensures Governance and Compliance

    Sponsored by: Atlassian

    As your enterprise grows, your security, governance, and compliance protocols have to grow with it. If not, you can find yourself caught in legal matters, subject to a significant data breach, or even worse, you can threaten your brand’s integrity and your customers’ trust. Read this e-book for 3 ways to ensure governance and compliance.

  • A Network Operations Guide for Internal Segmentation

    Sponsored by: Fortinet, Inc.

    Organizations have long practiced segmentation for breaking up flat internal networks. However, for network engineering and operations leaders who prioritize risk mitigation, effective security management and compliance, current segmentation approaches fall short. Read this white paper to learn about a new approach called internal segmentation.

  • Deep-Dive into MLPS 2.0 Compliance with Alibaba Cloud Solution

    Sponsored by: Alibaba Cloud

    As of Dec. 1, 2019, China has introduced a new version of their multi-level protection scheme law known as MLPS 2.0. As such, the Chinese government has updated its pre-existing requirement that individual 'network operators' in China must implement and maintain an MLPS with respect to their networks. Watch this webcast to get more details.

  • Overcome Barriers to Unite Security & DevOps

    Sponsored by: AWS - Anitian

    Organizations routinely fail to push beyond the initial start-up phases of integrating security and DevOps. This is largely due to the complexities around automating security configurations and enabling continuous monitoring. Watch this webinar to learn how to bring security (and compliance) into alignment with DevOps and CICD pipelines.

  • Achieving CCPA Compliance with ServiceNow and Covestic

    Sponsored by: Covestic

    The CCPA grants California consumers greater control over their personal information and how it’s used by organizations like your own. It also requires that organizations comply or face costly penalties. Tune in to hear industry experts discuss strategies for leveraging your ServiceNow deployments in order to meet the requirements of the CCPA.

  • Expenses, VAT, HMRC, and Revenue Compliance in a Nutshell

    Sponsored by: SAP Concur solutions

    VAT rules can be complex—not to mention HMRC and Revenue. In this eBook, SAP Concur offers some advice on how to manage these processes, based on the FAQs they receive.

  • TikTok Case Study

    Sponsored by: Lookout

    Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.

  • GDPR, CCPA, & Beyond

    Sponsored by: Talend

    Access this white paper to learn about the data sovereignty regulations that dictate data privacy across the globe including GDPR and CCPA and discover 16 steps to enact a data governance program for data privacy with Talend.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Sponsored by: Thales

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • Where Law and Tech Will Collide in 2020

    Sponsored by: RSA Conference

    The acceleration of “tech disruption” across all industries is exacerbating privacy risks to consumers globally. NIST has released draft privacy controls, providing guidance for companies to manage privacy risks. Watch this RSA Conference webinar to see industry experts discuss where technology and the law might find friction in 2020.

  • Capsule8’s FedRAMP Capabilities

    Sponsored by: Capsule8

    Download this overview to learn about all the key FedRAMP capabilities of Capsule8.

  • Capsule8 For HIPAA Compliance

    Sponsored by: Capsule8

    It’s crucial for healthcare providers to have reliable security controls in place to protect their patient’s data. Tap into this white paper to learn about key capabilities of Capsule8 Protect and how it can help you meet HIPAA compliance on your Linux based ePHI environment.

  • Titus Classification for Microsoft Office

    Sponsored by: TITUS

    Sharing documents in a collaborative work environment can be helpful but can also lead to security risks. In this data sheet, learn about the benefits of Titus Classification for Microsoft Office. It allows organizations to identify information sensitivity, prevent data loss, and meet compliance needs.

  • The Sunshine Laws, Freedom of Information and Compliance

    Sponsored by: Egress Software Technologies Inc

    Learn how you can use Egress to minimize response time to information requests and avoid a costly violation.

  • GDPR vs CCPA

    Sponsored by: Auth0

    Inside this guide to GDPR vs. CCPA, discover what businesses need to know to close compliance gaps between the two laws and how Auth0’s identity management platform can help.

  • The 2020 State of Compliance and Security Testing Report

    Sponsored by: Synack

    The 2020 State of Compliance and Security Testing Report provides some conclusions on 2020 imperatives of security teams including program structure and ownership, compliance requirements, testing approach and vendor strategy. Read on to reveal the results.

  • Discovery Inc. Case Study

    Sponsored by: DivvyCloud

    In this case study, find out how DivvyCloud allows Discovery to automate governance, offer flexibility, allow better insight and tighter controls and enhance compliance.

  • How DivvyCloud Enables Continuous Multi-Cloud Security and Compliance Best Practices for CoStar During Mergers and Acquisitions

    Sponsored by: DivvyCloud

    CoStar, the leading provider of commercial real estate information, analytics, and online marketplaces needed to ensure security and compliance of their cloud footprint. Learn how DivvyCloud provides CoStar with control over their cloud resources in a way that supports their business model and culture.

  • Cloudian HyperStore Compliance Assessment

    Sponsored by: Cloudian

    In this e-book, Cohasset Associates has been called upon to assess the capabilities of Cloudian HyperStore. Read on to learn Cohasset’s opinion on HyperStore which includes whether or not it retains records requiring time-based retention in compliance with the recording and non-rewritable, non-erasable storage of electronic records.

  • The Value of Identity Governance for Financial Services

    Sponsored by: SailPoint Technologies

    Identity governance helps you answer three important questions: “who currently has access?”, “who should have access?” and “how is that access being used?”Learn how SailPoint enables you to answer these questions and establish a foundation that is continuously secure and compliant.

  • HIPAA Compliance Checklist: The Key to Staying Compliant in 2020

    Sponsored by: Ostendio

    Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.