ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Software Research

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Understanding the Data Management Challenges of Dodd-Frank

    Sponsored by: Bloomberg

    Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.

  • Using Predictive Coding to Your E-Discovery Advantage

    Sponsored by: TechTarget CIO

    E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.

  • May Information Security Magazine

    Sponsored by: TechTarget Security

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • Enterprise Security: Why you need Effective Log Management

    Sponsored by: TechTarget Security

    For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.

  • IT Services Purchase Intentions 2013

    Sponsored by: TechTarget ComputerWeekly.com

    This survey of over 130 European IT professionals from Computer Weekly and TechTarget examines company's buying plans for IT services in 2013.

  • Top considerations for manufacturing compliance software

    Sponsored by: Epicor Software Corporation

    This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.

  • Tripwire Log Center Product Brief

    Sponsored by: Tripwire, Inc.

    Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.

  • Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security

    Sponsored by: Tripwire, Inc.

    View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.

  • Law & The Data Explosion

    Sponsored by: Symantec Corporation

    This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.

  • Rewriting the Rules of Patch Management

    Sponsored by: IBM

    By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.

  • Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance

    Sponsored by: Rapid7

    Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.

  • Computer Weekly - 22 May 2012: Why Tesco is spending £150m online

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing.

  • Closed-loop Records Management: The Stakes Are Too High to Ignore

    Sponsored by: RSD

    As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.

  • Overview of RSD Glass

    Sponsored by: RSD

    This white paper includes valuable information about information governance along with a solution to many governance challenges.

  • The Power of One - Simplify Identity and Access Management with a Unified and Intelligent Approach

    Sponsored by: Dell Software

    In this white paper, discover an intelligent, unified approach to identity and access management. Learn how to simplify provisioning, single sign-on, role management, multifactor authentication, privileged account management, and password management. See how you can enhance security—and improve user and IT productivity.

  • Collab Net Success Story

    Sponsored by: CollabNet

    Discover how a large investment banking firm with locations in 35 countries rolled out a quick, repeatable and flexible agile development process that is consistent across the organization and in compliance with CMMI.

  • Tivoli Endpoint Manager: Continuous Compliance in a Distributed World

    Sponsored by: Mainline Information Systems

    This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.

  • BDNA for Security: Strengthened Security Through Visibility

    Sponsored by: BDNA

    Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.

  • Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance

    Sponsored by: Oracle Corporation

    When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.

  • E-Guide: Risk Management and Compliance Enforcement for the Financial Industry

    Sponsored by: IBM

    This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.

  • Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company

    Sponsored by: IBM

    InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today.

  • E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems

    Sponsored by: Safestone Technologies

    This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.

  • End-to-End Secure Client to Cloud Access

    Sponsored by: Intel

    In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.

  • The Ten Best Practices for Secure Software Development

    Sponsored by: ISC2

    Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.