ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Audits Research

  • System z: Making great security even better

    Sponsored by: IBM

    Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.

  • Strategies to Maintain PCI DSS Compliance

    Sponsored by: GeoTrust, Inc.

    This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.

  • How to Comply with the HIPAA Security Rule

    Sponsored by: Thawte Inc.

    In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Using Predictive Coding to Your E-Discovery Advantage

    Sponsored by: TechTarget CIO

    E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.

  • Cloud-based archiving for e-discovery/compliance: Five "need to knows"

    Sponsored by: Hewlett Packard Enterprise

    This expert E-Guide discusses five key questions to answer when evaluating or developing a cloud-based archiving strategy for your business.

  • Enterprise Security: Why you need Effective Log Management

    Sponsored by: TechTarget Security

    For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.

  • Cloud Compliance Technical Guide

    Sponsored by: TechTarget Security

    Check out this expert technical guide for a global perspective on emerging cloud compliance issues.

  • Tips for Creating a HIPAA-Friendly BYOD Policy

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.

  • HIPAA Compliance Takes Patient, Employee and Vendor Followup

    Sponsored by: HP & Intel®

    This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.

  • Sustainability: From Strategic Objective to Compliance Operation

    Sponsored by: HP & Intel®

    This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.

  • Put Compliance Management Back into Server Virtualization

    Sponsored by: HP & Intel®

    This e-guide from searchCompliance.com offers expert insight that will help ensure your business remains compliant before, during and after any server virtualization implementation. Read now to learn how you can put compliance management back into server virtualization.

  • Symantec Enterprise Vault

    Sponsored by: Symantec Corporation

    Check out this short white paper to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.

  • Law & The Data Explosion

    Sponsored by: Symantec Corporation

    This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.

  • Business-Driven Identity and Access Management: Why This New Approach Matters

    Sponsored by: Aveksa

    This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.

  • 4 issues caused by retaining too much unnecessary data

    Sponsored by: DLT Solutions

    Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two.

  • Compliance strategies for greater cyber security policies

    Sponsored by: HP Enterprise Security

    Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.

  • Windows Application and Server Backup 2.0: Chapter 8- Other Backup Concerns and Capabilities

    Sponsored by: Dell AppAssure Backup, Replication and Recovery Software

    Learn about disaster recovery, data retention for compliance and integrating your existing backups with virtualized server backups in the eighth chapter of this e-book.

  • Common Sense Case for Data Retention Policies

    Sponsored by: DLT Solutions

    Read this expert tip guide today to discover the business case for deploying a data retention policy amid today's massive data growth.

  • Presentation Transcript: Balancing compliance with security

    Sponsored by: HP Enterprise Security

    This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.

  • Improving regulatory compliance management through log analysis, SIM

    Sponsored by: HP Enterprise Security

    This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.

  • eBook: Trends in Healthcare Data Protection

    Sponsored by: LANDesk Software

    This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.

  • Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System

    Sponsored by: Iron Mountain

    Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.

  • Closed-loop Records Management: The Stakes Are Too High to Ignore

    Sponsored by: RSD

    As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.

  • Data Centre Energy Efficiency IT Handbook

    Sponsored by: TechTarget Data Center

    The deadline for the UK's Carbon Reduction Commitment scheme has now passed, and companies will begin to receive fines if they can't demonstrate how they've reduced their carbon footprint or are putting processes in place to do so. This expert IT handbook offers detailed information about this new regulation and how organisations can adhere to it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.