Compliance Best Practices Research
-
Three Guiding Principles to Improve Data Security and Compliance
Sponsored by: IBMIn this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.
-
Who’s Snooping on Your Email?
Sponsored by: SophosThis exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
-
Compliance Management's Seven Steps to Success
Sponsored by: InfobloxFailure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
-
Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
Sponsored by: IxiaIt is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
-
Million Dollar HIPAA Penalties for Healthcare
Sponsored by: AbsoluteThe threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
-
Reducing the costs and risks of data storage in the federal government
Sponsored by: IBMThis resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
-
Moving Up the Software License Optimization Maturity Curve to Drive Business Value
Sponsored by: Flexera SoftwareDefining and implementing a strategy for software asset management (SAM) and license optimization isn't easy -- but with the right tools and processes, it's definitely possible. Access this informative resource to explore the common challenges of SAM, and how you can ensure your software license optimization program is on its way to full maturity.
-
Are Your File Transfer Methods Compliant?
Sponsored by: OpenTextThis paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
-
Rules, risk and the potential for profit in the world of Basel III
Sponsored by: IBMBob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III
-
Crafting a Secure Approach to Mobility and Compliance
Sponsored by: TechTarget Mobile ComputingThis expert resource discusses key security features that need to be addressed when creating an effective mobile strategy, including how you can ensure compliance. Read on and learn about crucial topics such as encryption, data protection, and mobile application management.
-
UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
Sponsored by: TechTarget SecurityThis expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life.
-
An insurance firm eases regulatory compliance while reducing risk
Sponsored by: IBMLearn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
-
CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
Sponsored by: LogRhythm, Inc.This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
-
Computer Weekly special report: Mobile device management and the importance of absolute compliance
Sponsored by: BlackBerryEnsuring regulatory compliance can be difficult when dealing with an influx of mobile devices, but it's still critical. Learn how to create a bring-your-own-device, or BYOD, policy that will keep your organisation completely compliant.
-
eBook: Data Security in the E-discovery Process
Sponsored by: Dell and VMwareIn this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
-
MOBILE HEALTH TRENDS 2013: BYOD HERE TO STAY
Sponsored by: HP & Intel®This expert handbook takes an in-depth look at the latest BYOD and mobile trends that organizations are adopting, examining the common problems that CIOs and IT are facing and what you can do to best overcome them.
-
Hitting the Information Governance and Compliance Sweet Spot
Sponsored by: IBMIn this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
-
Information Governance for Business Value
Sponsored by: IBMIn this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.
-
Beyond Government Incentives: Return on Investment in EHRs
Sponsored by: HP & Intel®Meaningful use is only the beginning: Efficiency and more appropriate coding bring savings and increase revenues. This white paper discusses features and benefits of an EHR system, government incentives, sources for ROI as well as building the business case for EHR.
-
Strategies for Writing a HIPAA-friendly BYOD Policy
Sponsored by: HP & Intel®This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
-
Selecting the right EHR for the Life of your Practice and Your Patients
Sponsored by: HP & Intel®If we are at or approaching a technological tipping point in the history of healthcare, then it has never been more important for physician practices to select the right electronic health record (EHR) – and there are tangible reasons to believe so. This white paper discusses criteria for selecting the right EHR solution.
-
New standards for certified EHRs drive industry toward coordination
Sponsored by: HP & Intel®This E-guide from SearchHealthIT.com discusses the changing requirements of the new EHR certification standards. Read now to learn about the challenges and ways this new criteria will affect both health care providers and EHR vendors.
-
Strategies to Maintain PCI DSS Compliance
Sponsored by: GeoTrust, Inc.This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
-
Tips to Develop the Right Retention Schedule for your Organization
Sponsored by: TechTarget CIOCheck in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
-
Securing and Mitigating Risk in the Cloud
Sponsored by: TechTarget SecurityCloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition.