Compliance (Systems Operations) Research
-
Internal controls checklist for corporate data protection, compliance
Sponsored by: Novell, Inc.In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.
-
Information security and compliance services overview
Sponsored by: DellEMC and Intel®With new threats emerging and the pressures the meet compliance, your organization is forced to focus more on security and less on strategic projects that drive your business. Access this paper for an overview of security and compliance solutions available to help handle your security issues, freeing your time to focus on growing your business.
-
Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management
Sponsored by: Novell, Inc.Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program.
-
Bringing strong business leadership to the information integration platform
Sponsored by: IBMIn this presentation transcript, BI expert Wayne Eckerson will discuss why delivering clean, consistent, and integrated data is so challenging and prescribe several ways to achieve integrated data, including allocating the right people, establishing the right processes, and selecting the right technologies.
-
Whitepaper: IBM Optim Data Redaction: Reconciling openness with privacy
Sponsored by: IBMRedaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.
-
Valeo Drives Global Best Practices
Sponsored by: Apriso CorporationRead this case study and learn how Valeo realized its vision to continuously improve product innovation, operations and logistics performance by using Apriso’s FlexNet software to achieve inventory tracking, material flow visibility, and packaging and labeling compliance goals across its enterprise.
-
Oracle Enterprise Manager 11g
Sponsored by: Oracle CorporationThis white paper describes the key capabilities in Oracle Enterprise Manager 11g and how it enables IT organizations to deliver greater business value through higher business efficiency and agility.
-
Presentation Transcript: Changing Authentication Options
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
-
Presentation Transcript: Risk Mitigation – Bang for the Buck
Sponsored by: ActivIdentity CorporationFinancial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.
-
E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: Safestone TechnologiesThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
Sponsored by: ArcSight, an HP CompanyThis webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
-
ArcSight Logger: Universal Log Management Solution
Sponsored by: ArcSight, an HP CompanyArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.
-
Keep Your Enemies Closer - Get Proactive about Security
Sponsored by: AT&T CorpForrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.
-
SharePoint E-zine -- February 2011: SharePoint Governance and e-Discovery
Sponsored by: TechTarget Search Windows ServerInformation in SharePoint is subject to the same rules and regulations as other corporate data. Learn what you need to do to prepare for any e-discovery request. Also in this issue, choose third-party tools to help manage a multi-server SharePoint farm, and get expert advice on making SharePoint more secure.
-
EMC VNXe Series Software Packs: Simple Data Protection and More
Sponsored by: EMC Computer Systems (UK) Ltd.EMC has packaged unique and powerful add-on storage software into two attractively priced, easy-to-order software packs: Total Value Pack and Total Protection Pack available for the VNXe 3100 and VNXe 3300 respectively, ensuring maximum protection, security, and compliance.
-
Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation
Sponsored by: Tripwire, Inc.This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.
-
A Pragmatic Approach to SIEM
Sponsored by: Tripwire, Inc.In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
-
Expert E-Book: Data Security and the Cloud
Sponsored by: TechTarget SecurityThis e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
-
Database Security Audit and Protect Critical Databases
Sponsored by: ImpervaDatabases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
Why Cloud Backup: Top 10 Reasons
Sponsored by: Iron MountainIncreasingly, organizations are adopting cloud backup solutions to address their data protection challenges. Read this white paper to learn more.
-
The Big Shift to Cloud-based Security
Sponsored by: QualysAccess this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.
-
Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives
Sponsored by: IBMWhen IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes.
-
E-Book: Standardizing Business Continuity
Sponsored by: IBMDownload this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
-
The Information Agenda: Rapidly Leveraging Information as a Trusted Strategic Asset for Competitive Advantage
Sponsored by: IBMAs the CIO of a flourishing business, you are happy to report that the current information projects are going well. The new call center is up and running, the new data warehouse is on-line, and the new customer loyalty systems have been deployed successfully.
-
Criteria for Meaningful Use of EHR: Understanding the Fundamentals
Sponsored by: Hewlett Packard EnterpriseCheck out this e-guide for a chart that outlines the proposed criteria for Stage 1 of demonstrating meaningful use of EHR. Eligible hospitals and doctors who want to qualify for payment incentives through the health IT provisions of the ARRA must meet these criteria.