Compliance (Systems Operations) Research
-
Addressing HIPAA privacy compliance on hospital wireless networks
Sponsored by: AbsoluteIn this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
-
Four steps to ensure IT investments benefit regulatory compliance
Sponsored by: Hewlett Packard EnterpriseIn this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
-
Electronic discovery management in the age of big data
Sponsored by: TechTarget SecurityElectronic discovery management can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era.
-
Five critical steps to achieving an effective application security program
Sponsored by: IBMThis white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
-
Managed file transfer: Minimizing risk and strengthening compliance in data exchange
Sponsored by: IBMIn this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
What to Look For In a Backup Solution to Deliver Improved Business Continuity
Sponsored by: Datto, Inc.This expert guide provides tips on building a holistic backup solution that protects your business from potentially devastating downtime, no matter what the cause. Access now to learn how you can implement a successful business continuity plan and give your enterprise a competitive edge.
-
Voltage Success Story: Envision Pharmaceutical Services
Sponsored by: Voltage Security, Inc.This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI)
Sponsored by: Voltage Security, Inc.This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
-
AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
Sponsored by: BitGlassIn this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
-
Anypoint Platform Cloud Security & Compliance
Sponsored by: MuleSoftThis white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
-
Accelerating Database Test and Development
Sponsored by: Oracle and Intel®This white paper explains the benefits of a solution that can easily be added to an existing Data Guard configuration to provide an industry leading low-cost, time and space efficient solution to enterprise requirements for snapshots and clones.
-
Best Practices for Maintaining GRC During the Modern Age of Cloud Computing, BYOD and Big Data
Sponsored by: IBMThis expert e-guide details three steps for maintaining compliance during cloud deployment, how BYOD and the cloud increase risk and how cloud SLAs can alleviate that risk and enhance data recovery.
-
Enterprise Vault Archiving Overview
Sponsored by: Symantec CorporationThis video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
-
Hardening Hadoop for the Enterprise
Sponsored by: WANdiscoPrepare for Hadoop implementation with this knowledgeable webcast.
-
Workflow, governance and reporting – Solvency II
Sponsored by: IBMThe following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
-
How desktop and app virtualization affects IT security
Sponsored by: CitrixThis white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
-
How to Create the Most Effective Compliance Program at Your Organization
Sponsored by: IntraLinks, IncIn this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
-
Information Visibility: Reducing Business Risk with The Clearswift Aneesya Platform
Sponsored by: ClearswiftIn this white paper, discover an information governance platform that offers real-time insight to improve threat detection and enhance governance and compliance reporting.
-
A Step-By-Step Guide to Monetizing Cloud Data Protection and Collaboration
Sponsored by: InfrascaleThis resource offers 6 critical tips for MSPs to help clients secure sensitive business data in a growing endpoint and cloud-based environment.
-
Maintaining Continuous Compliance: A New Best-Practice Approach
Sponsored by: IBMThis resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
-
Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
Sponsored by: IBMThis white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
-
Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
Sponsored by: IBMThis resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
-
Preventing Dangerous File-Sharing
Sponsored by: GlobalscapeThis resource offers 4 steps to help prevent employees from using unsecured consumer-grade file-sharing solutions.
-
Transferring Data without Secure Protocols?
Sponsored by: GlobalscapeThis white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.