ComputerWeekly.com Research Library

Powered by Bitpipe.com

Governance, Risk, Compliance (GRC) Research

  • The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD

    Sponsored by: TechTarget Security

    Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.

  • Advances in Financial Disclosure and Risk Management

    Sponsored by: IBM

    This on-demand webcast investigates performance management and analytics tools that can help drive success in finance and risk management. Watch now to discover product updates, best practices, and more.

  • PCI DSS Simplified: What You Need to Know

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • Gamania Group tightens security to strengthen game development capability

    Sponsored by: Hewlett Packard Enterprise

    Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.

  • Creating a Mobile-Centric Organization

    Sponsored by: Hewlett Packard Enterprise

    Discover an innovative approach to designing and deploying networks that can help you support a mobile workforce while lowering costs and cutting complexity.

  • Keep Cloud Compliant

    Sponsored by: TechTarget Security

    Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.

  • Tackling the Data Security Challenge

    Sponsored by: IBM

    In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.

  • Information Governance for Business Value

    Sponsored by: IBM

    In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.

  • Modern Retention Enablement

    Sponsored by: IBM

    This quick video explains why legal departments need the what, who, and where of records and information management (RIM) files.

  • Moving Beyond People Glue and Silos

    Sponsored by: IBM

    This quick video outlines why replacing this "people glue" strategy with reliable, repeatable systems and processes that break siloes and meet the needs of multiple users across the organization is critical to interlinking success and truly achieving information governance.

  • Strategies to Maintain PCI DSS Compliance

    Sponsored by: GeoTrust, Inc.

    This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.

  • Tips to Develop the Right Retention Schedule for your Organization

    Sponsored by: TechTarget CIO

    Check in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.

  • Where BCDR and GRC Come Together: A CIO's Guide

    Sponsored by: Essextec

    In this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.

  • GRC Solutions from itelligence: Balance Risk And Opportunity With A Practical Approach to GRC

    Sponsored by: itelligence, Inc.

    To keep pace in today's constantly evolving regulatory environment, you need a comprehensive governance, risk, and compliance (GRC) system. This brief white paper highlights how the right GRC strategy can help you standardize business process and increase control over compliance issues.

  • May Information Security Magazine

    Sponsored by: TechTarget Security

    This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  • PowerBroker Password Safe: Security, Compliance, Productivity

    Sponsored by: BeyondTrust Corporation

    Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.

  • Build Your Identity And Access Management Strategy

    Sponsored by: Symplified

    This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.

  • CIO Handbook: The Risk Management Approach to Information Governance

    Sponsored by: TechTarget Security

    This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.

  • IT Handbook: Getting Over the Cloud Adoption Hurdle

    Sponsored by: TechTarget Cloud Computing

    This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.

  • APT Defense Mechanisms and Best Practices

    Sponsored by: Infoblox

    Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.

  • Secrets of Successful Self Service BI

    Sponsored by: TechTarget Business Analytics

    In today's fast-paced atmosphere, consumers want their information to be available instantly. View this white paper to learn more about how you can give business users easy-to-use BI tools and let them complete their own data anaylsis and reports. Find out how you can provide BI teams the use of self-service applications by reading this resource.

  • Continuous monitoring, remediation and CyberScope reporting

    Sponsored by: IBM

    This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA).

  • Risk Management: Safeguarding Against a World of Threats

    Sponsored by: HP Enterprise Security

    Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.

  • E-Guide ECM and Information Governance

    Sponsored by: OpenText

    This expert e-guide looks at the importance of governance in enterprise content management (ECM) initiatives and provides suggestions for structuring and managing a sound policy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.