ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulations Research

  • Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist

    Sponsored by: TechTarget Security

    Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.

  • IT in Europe - May 2012

    Sponsored by: TechTarget Security

    While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

  • E-Guide: Uniting SIM and IAM to Boost Security

    Sponsored by: TechTarget Security

    When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.

  • Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN

    Sponsored by: IBM and SI Architects

    In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.

  • How to Manage Secure File Transfers to Meet Compliance Requirements

    Sponsored by: IBM and SI Architects

    This expert eGuide will help you learn how to maintain a balance between functionality and security when it comes to wide area network (WAN) file transfers. IT expert Dan Sullivan answers questions about WAN management and how to ensure secure transfers.

  • Sustainability: From Strategic Objective to Compliance Operation

    Sponsored by: HP & Intel®

    This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.

  • E-Discovery Cloud Considerations

    Sponsored by: Symantec Corporation

    In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.

  • 4 issues caused by retaining too much unnecessary data

    Sponsored by: DLT Solutions

    Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two.

  • Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom?

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security.

  • Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements

    Sponsored by: Oracle Corporation

    Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.

  • Compliance Frameworks That Enhance e-Discovery Effectiveness

    Sponsored by: AXS-One, a Daegis Company

    The threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace.

  • E-Book: Improving Supply Chain Visibility via Technology: Options, trends, and ROI-driven projects

    Sponsored by: iMANY

    Brush up on the latest technologies for supply chain visibility that will improve efficiency and get your company a higher ROI.

  • Networking Compliance

    Sponsored by: DellEMC and Intel®

    This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.

  • Best Practices for Managing the Increasing Depth of Compliance Regulation

    Sponsored by: IBM

    According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.

  • Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance

    Sponsored by: Oracle Corporation

    When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.

  • Revamping and optimizing your SAP GRC strategy

    Sponsored by: Security Weaver

    GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.

  • Cloud-Stored Offsite Database Backups

    Sponsored by: Oracle Corporation

    Cloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.

  • Solutions Brief: Oracle Solutions for Governance, Risk and Compliance

    Sponsored by: Oracle Corporation

    Read this white paper to learn about Oracle’s comprehensive GRC platform and how leading enterprises are turning to Oracle’s new platform to meet the demands of increasingly challenging regulatory mandates while continuing to innovate and grow their business.

  • Database Security: Audit and Protect Critical Databases

    Sponsored by: Imperva

    Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.

  • Knowledge is Power

    Sponsored by: IBM

    Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.

  • The State of IT Systems Management

    Sponsored by: Kaseya

    This white paper is the culmination of the survey results, painting a complete and accurate picture of the most common IT issues affecting IT professionals and Kaseya’s solution to solving these problems.

  • E-Guide: Information Security Essential Guide to Compliance

    Sponsored by: Information Security Magazine

    Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.

  • The State of Privacy and Data Security Compliance

    Sponsored by: Sophos

    The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • Simplifying the Collection of Laptop and Desktop Data for eDiscovery

    Sponsored by: Iron Mountain

    Enterprises today are confronting a dramatic increase in litigation, regulations, and compliance scrutiny. Read this paper to find out more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.