Compliance (Systems Operations) Research
-
IT Handbook: Offsite Messaging Decisions for the Exchange Admin
Sponsored by: TechTarget Data CenterHosting Exchange Server off-site may appeal to businesses getting comfortable with the idea of cloud computing and its various advantages, but is it really a good idea?
-
Best Practices for Oracle Licence Management
Sponsored by: Flexera SoftwareIn this white paper you will learn five reasons why your Oracle licensing requirements may evolve, the five best practices for Oracle license management and more.
-
Presentation Transcript: Staying Compliant in the Cloud
Sponsored by: IntelAccess this resource for a detailed outline of the complications involved with meeting regulatory compliance and what your responsibilities are for compliance in a public cloud setting.
-
Security in Cloud Computing
Sponsored by: IntelNew and improved technologies can improve cloud security and smooth the transition in your enterprise. Access this white paper to learn how these solutions can allow your business to take advantage of all the cloud has to offer while maintaining a secure infrastructure.
-
Information Retention and eDiscovery Survey
Sponsored by: Symantec CorporationThis white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.
-
Enterprise capture ushers in a new era of business process efficiency
Sponsored by: IBMTake a few minutes to discover how enterprise capture software from IBM can help you reduce the cost and complexity of business processes across your organization.
-
Align policy, processes and people for efficient tax and finance operations
Sponsored by: IBMLearn how to leverage advanced case management to apply analytics to detect fraud and support investigations.
-
Eguide: Top 10 risks in cloud computing and how to stay compliant
Sponsored by: TechTarget SecurityTransitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.
-
How Archiving Reduces the Cost and Complexity of "Reactive" eDiscovery
Sponsored by: Symantec CorporationThis paper attempts to identify and clarify the benefits an archive can provide in the initial phases of the electronic discovery process and look at some of the features companies should look for to ensure those benefits are maximized.
-
E-Guide: Nasuni Filer Adds SLA, Hardware Option for NAS Cloud Gateway
Sponsored by: NasuniThis SearchCloudStorage.com E-Guide profiles startup cloud vendor, Nasuni Corp., and offers insight into what they are doing to ease customer concerns about cloud storage – and guarantee uptime in cloud environments. Read on to find out about more Nasuni’s new product offerings and service-level agreements!
-
Presentation Transcript: Manufacturing IT for Shop-floor Compliance and Quality Control
Sponsored by: Apriso CorporationThis presentation transcript covers how to leverage MES and related technologies in conjunction with best practices to drive continuous improvement toward quality and compliance.
-
Networking Compliance
Sponsored by: DellEMC and Intel®This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
-
Intel Cloud Builders Guide: Cloud Design and Development on Intel Platforms Trusted Computer Pools with Parellels
Sponsored by: IntelThis white paper describes six key aspects of security and offers advice for addressing them in your cloud strategy.
-
E-Guide: Optimizing your Tape Backup Strategy
Sponsored by: Iron MountainDownload this expert E-Guide to learn how to optimize your tape backup and recovery and criteria for choosing an offsite tape storage service.
-
Client Case Study: Bouyges Telecom
Sponsored by: IBMIn this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue.
-
Client Case Study: London Borough of Brent
Sponsored by: IBMThis paper discusses how Brent used IBM to supply the customer data integration and master data management (MDM) to consolidate back-end systems to reduce administration costs, improve customer service and minimise benefit fraud.
-
Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS)
Sponsored by: IBMThis white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information.
-
Controlling Risk Through Software Code Governance
Sponsored by: Coverity by SynopsysSoftware code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
-
5 Mistakes Auditing Virtual Environments (You Don't Want to Make)
Sponsored by: HyTrustRead this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process.
-
Maintaining Continuous Compliance – a new best practice approach
Sponsored by: IBMWhen trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.
-
Rewriting the Rules of Patch Management
Sponsored by: IBMIn the following white paper, you'll find the information you need to spearhead your patch automation initiatives. Read now and discover a fresh approach to patch management that deploys patches organization-wide in hours.
-
Oracle Advanced Security with Oracle Database 11g Release 2
Sponsored by: Oracle CorporationThis white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
-
Oracle Enterprise Manager 11g Configuration Management Pack
Sponsored by: Oracle CorporationThis white paper takes a three-pronged approach to configuration management: simplifying the management of your IT infrastructure; improving the level of service you provide your end users; and enforcing compliance with real-time change detection for files, database objects, users, and processes.
-
E-Guide: Next Steps and Trends in Enterprise Content Management
Sponsored by: DellEMC and Intel®Enterprise content management is a long-established market, but ECM technology is changing, evolving and taking on increased importance to organizations. This eBook provides an overview of ECM, a recap of recent developments in the market and an in-depth look at emerging management trends.
-
2010 Endpoint Risk Assessment: Internal Vulnerabilities
Sponsored by: PromisecThis study will show you the most common security issues that were found and how they were dealt with by the various organizations.