ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Best Practices Research

  • The Total Economic Impact of Armor Anywhere

    Sponsored by: Armor

    In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.

  • The Complete Guide for Preventing Costly Data Leaks for UK Local Governments

    Sponsored by: Zivver

    For local governments in the UK, a data leak can be catastrophic, not to mention expensive. This guide provides a deep dive into the risks that lead to data leaks and what UK councils can do to prevent them from happening.

  • Analyzing the Economic Benefits of Proofpoint Insider Threat Management

    Sponsored by: Proofpoint

    With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.

  • Data Storage for Every Data Tier

    Sponsored by: Iron Mountain

    Access this data sheet to learn how Iron Mountain’s Data Management Service Portfolio lets you do things like easily move inactive cloud data to tape, decrease your storage costs and ensure long-term archival data compliance.

  • IT-GRC Tools

    Sponsored by: ServiceNow

    IT GRC tools are emerging as one of the most effective ways for organizations to create, organize and manage GRC policies. This KuppingerCole Market Compass report covers the top IT GRC vendors and tools that can assist organizations in reducing the risk of non-compliance – read on to unlock the full report.

  • Path to PCI-DSS 4.0: Simplifying Compliance and Securing Cardholder Data

    Sponsored by: ColorTokens

    PCI-DSS v4.0 is expected to arrive in late 2020/early 2021 – and organizations are beginning to prepare. This webinar provides an overview of PCI-DSS 4.0, including the expected changes, what will (likely) remain unchanged, how zero-trust fits in, and more – watch now to get started.

  • A Focused Approach to Managing Risk in Uncertain Times

    Sponsored by: ServiceNow

    As businesses emerge from the initial COVID-19 crisis, they are coming under immense pressure to adapt their risk and resilience programs to the evolving effects of COVID-19 and other potential disruption. In this white paper, uncover 4 steps businesses can take to help them become more resilient, control risks and maximize productivity.

  • Risk Management as Revenue Driver: An Adaptive Approach

    Sponsored by: LogicGate

    Recently, PwC interviewed 1,535 executives in risk functions from 76 countries and across 30 different industries. They used this information to serve as models in their successful approaches to risk. These “Adapters,” as they’re called, were effective in tackling innovation-related risks. Read this article to see why they stood out.

  • Rethinking ‘Business as Usual’ Post-Pandemic

    Sponsored by: TATA Communications

    Virtually every industry in every location has been impacted by COVID-19. In this blog, Tata Communications’ Vice President of Business Collaboration, Peter Quinlan, looks at what businesses will need to consider when it comes to their collaboration and business strategies in the long-term.

  • How to Comply with PCI-DSS 4.0

    Sponsored by: ColorTokens

    PCI-DSS 4.0 is expected to roll out mid-2021, and organizations are preparing their compliance strategies to reflect the expected adjustments. This article provides an overview of what will change in PCI-DSS 4.0, what will carry over, and how to pick a technology partner to help achieve compliance.

  • Manage Security Risk with Red Hat Insights

    Sponsored by: Red Hat

    Access this white paper to learn about Red Hat Enterprise Linux, a tool that offers 5 key benefits for organizations looking to analyze, prioritize, and remediate issues as well as report their status.

  • What is Operational Resilience?

    Sponsored by: LogicGate

    According to Gartner, operational resilience is a set of techniques that allows people, processes and information systems to adapt to changing patterns. How do businesses not just prepare but succeed when faced with the unexpected? Read this quick article to get an understanding of how organizations comprehend their respective risk.

  • The Top 5 InfoSec Professional Challenges

    Sponsored by: LogicGate

    What keeps you up at night? If you’re anything like most risk and information security professionals, the list is long. Juggling security concerns, reporting on risk data, and managing the latest regulatory requirements all add up. To stay in the know, read the top 5 challenges infosec professionals face, and the common thread linking them all.

  • The Risk Cloud

    Sponsored by: LogicGate

    Approaches to risk management are shifting from reactive to proactive. Integrating risk management programs is a key to growth in today’s digital landscape. Many of the challenges involving risk, including lack of visibility and poor UX, can be solved through a more agile approach. Read this white paper to learn about the Risk Cloud and agile GRC.

  • Armor Secure Hosting Proactive Security for Payment Transactions and PCI Data

    Sponsored by: Armor

    Businesses requiring PCI compliance are in between a rock and a hard place when it comes to continuity. They need to be able to scale, but various security vulnerabilities introduce themselves through the process. Now, you can be both secure and compliant. Scan this data sheet on Armor Secure Hosting to learn how to proactively secure payments.

  • Security and Compliance for a Case Management SaaS

    Sponsored by: Armor

    When a private case management platform evolved into a software-as-a-service (SaaS) offering, a healthcare tech company needed a secure cloud-based solution that could help ensure HIPAA compliance. Read this comprehensive case study to learn about Armor Anywhere, a secure hosting platform designed with security and compliance in mind.

  • Overhauling Endpoint Protection Aids Innovation and Strengthens Security Posture

    Sponsored by: McAfee, Inc.

    In this case study, follow the journey of Sutherland Global Services, a business process transformation provider with a growing number of global endpoints, as they partner with McAfee in order to provide 24/7 availability to their workforce, unify security processes and address compliance requirements.

  • Beyond COVID-19 Webinar

    Sponsored by: Hyperproof

    COVID-19 has both introduced new risks and amplified existing ones. Business continuity, security, crisis management and customer acquisition have all been put to the test, and all the while, the economy has become totally unpredictable. Watch this webinar to learn how to manage new risks and stay compliant throughout COVID-19 and beyond.

  • Qorus Software Uses Hyperproof to Gain Control Over Its Compliance Program

    Sponsored by: Hyperproof

    In this case study, follow Qorus, a sales enablement and proposal management provider, as they partner with Hyperproof to address security and compliance issues and achieve flexibility that scales as the organization grows.

  • SASE For Dummies

    Sponsored by: Cato Networks

    SASE converges the functions of networking and network security point solutions into a unified, global, cloud-native service. It is an architectural transformation of enterprise networking and security that enables IT to provide a holistic, agile, and adaptable service to the digital business. Read this e-book to learn the basics of SASE.

  • The Three Mega Trends CISOs Need to Watch

    Sponsored by: Hyperproof

    Today’s CISO faces pressure on many fronts – an expanding threat landscape, an exponentially growing volume of data and increasingly stringent data privacy laws. Read this guidebook to discover how CISOs can navigate and manage each of these challenges, and more.

  • The Legal Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.

  • The CIO’s Cybersecurity Checklist

    Sponsored by: Arctic Wolf Networks, Inc.

    CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.

  • Survey Report: Evolution of the CASB

    Sponsored by: Proofpoint

    In the wake of COVID-19, work-from-home orders issued by most companies and governments have accelerated the digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the enterprise. View this report to get a perspective on the use of CASBs.

  • Cybersecurity Compliance Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.