ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance (Systems Operations) Research

  • The Hotel Hijackers

    Sponsored by: Panda Security

    Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.

  • Network Security Tools for GDPR

    Sponsored by: Aruba Networks

    From data protection to network access security control, learn what cybersecurity tools are best positioned to help you anticipate, detect, and eliminate threats so that you can meet GDPR guidelines, even in complex, multi-vendor environments.

  • Financial markets regulatory outlook 2017

    Sponsored by: ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • Recommendations on rolling back government surveillance

    Sponsored by: ComputerWeekly.com

    Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.

  • Get your Content Management System GDPR-Ready

    Sponsored by: Box

    In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • Improving Revenue and Population Health: New Strategies for Health IT

    Sponsored by: Medfusion

    Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.

  • GRC Strategies for the Digital Business

    Sponsored by: SearchCompliance.com

    Digitization has become a fact life for businesses, but the increased data volumes and associated information security risk puts a strain on digital governance, risk and compliance resources. In this SearchCompliance handbook, learn how companies are adapting GRC budgeting and strategic processes to keep up with the speed of digital business.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • Beyond BYOD: How IoT and new tech is changing modern GRC

    Sponsored by: SearchCompliance.com

    As the IoT continues to gain popularity, capitalizing on its business benefits require big changes to companies' GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data management, security and compliance processes, and strategies to take full business advantage of IoT data.

  • Cybersecurity and Privacy Compliance: The Delicate Balance

    Sponsored by: SearchCompliance.com

    This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.

  • Software Compliance at a Fast Velocity

    Sponsored by: Chef Software

    How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.

  • Cloud Risk Management: Governance Strategies to Protect Digital Assets

    Sponsored by: SearchCompliance.com

    In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.

  • Endpoint Security Management: Beyond Antivirus

    Sponsored by: SearchSecurity.com

    Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.

  • Data Governance Strategies for the Digital Age

    Sponsored by: SearchCompliance.com

    The digital age has forced many companies to alter - and sometimes completely revamp - data governance processes. In this handbook, learn about big data governance complications and the latest information management strategies for adapting to increased storage needs, data-specific compliance mandates and security vulnerabilities in the digital age.

  • Deploying Microsoft Exchange 2013 Just Got Easier

    Sponsored by: Citrix

    Access this informative guide that explains how to deploy Microsoft Exchange 2013 with an ADC that ensures remote access and load balancing of core components.

  • CIO Decisions E-Zine - February 2015

    Sponsored by: SearchCIO.com

    When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.

  • BYOD Compliance: Keep Mobile Data Regulation-Ready

    Sponsored by: SearchCompliance.com

    In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.

  • The SOX Effect

    Sponsored by: SearchCompliance.com

    In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.

  • Addressing HIPAA privacy compliance on hospital wireless networks

    Sponsored by: Absolute

    In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.

  • Four steps to ensure IT investments benefit regulatory compliance

    Sponsored by: Hewlett Packard Enterprise

    In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.

  • Electronic discovery management in the age of big data

    Sponsored by: SearchCompliance.com

    Electronic discovery management can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era.

  • Five critical steps to achieving an effective application security program

    Sponsored by: IBM

    This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.

  • Managed file transfer: Minimizing risk and strengthening compliance in data exchange

    Sponsored by: IBM

    In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.