Regulations Research
-
Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
Sponsored by: TechTarget SecurityOrganizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
-
IT in Europe - May 2012
Sponsored by: TechTarget SecurityWhile network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
-
E-Guide: Uniting SIM and IAM to Boost Security
Sponsored by: TechTarget SecurityWhen logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
-
Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
Sponsored by: IBM and SI ArchitectsIn this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
-
How to Manage Secure File Transfers to Meet Compliance Requirements
Sponsored by: IBM and SI ArchitectsThis expert eGuide will help you learn how to maintain a balance between functionality and security when it comes to wide area network (WAN) file transfers. IT expert Dan Sullivan answers questions about WAN management and how to ensure secure transfers.
-
Sustainability: From Strategic Objective to Compliance Operation
Sponsored by: HP & Intel®This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
-
E-Discovery Cloud Considerations
Sponsored by: Symantec CorporationIn this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.
-
4 issues caused by retaining too much unnecessary data
Sponsored by: DLT SolutionsAccess this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two.
-
Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom?
Sponsored by: TechTarget ComputerWeekly.comThis week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security.
-
Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
Sponsored by: Oracle CorporationAlthough most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
-
Compliance Frameworks That Enhance e-Discovery Effectiveness
Sponsored by: AXS-One, a Daegis CompanyThe threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace.
-
E-Book: Improving Supply Chain Visibility via Technology: Options, trends, and ROI-driven projects
Sponsored by: iMANYBrush up on the latest technologies for supply chain visibility that will improve efficiency and get your company a higher ROI.
-
Networking Compliance
Sponsored by: DellEMC and Intel®This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
-
Best Practices for Managing the Increasing Depth of Compliance Regulation
Sponsored by: IBMAccording to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations. Learn what actions your organization can take to ensure compliance with evolving regulations.
-
Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance
Sponsored by: Oracle CorporationWhen organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.
-
Revamping and optimizing your SAP GRC strategy
Sponsored by: Security WeaverGRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
-
Cloud-Stored Offsite Database Backups
Sponsored by: Oracle CorporationCloud backups are the right protection for databases running within the compute Cloud. Read this white paper to learn about how Cloud storage can be a benefit to your organization.
-
Solutions Brief: Oracle Solutions for Governance, Risk and Compliance
Sponsored by: Oracle CorporationRead this white paper to learn about Oracle’s comprehensive GRC platform and how leading enterprises are turning to Oracle’s new platform to meet the demands of increasingly challenging regulatory mandates while continuing to innovate and grow their business.
-
Database Security: Audit and Protect Critical Databases
Sponsored by: ImpervaDatabases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
Knowledge is Power
Sponsored by: IBMYour software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
-
The State of IT Systems Management
Sponsored by: KaseyaThis white paper is the culmination of the survey results, painting a complete and accurate picture of the most common IT issues affecting IT professionals and Kaseya’s solution to solving these problems.
-
E-Guide: Information Security Essential Guide to Compliance
Sponsored by: Information Security MagazineCompliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
-
The State of Privacy and Data Security Compliance
Sponsored by: SophosThe purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.
-
IT Decision Checklist: Antimalware
Sponsored by: ESETCompanies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
-
Simplifying the Collection of Laptop and Desktop Data for eDiscovery
Sponsored by: Iron MountainEnterprises today are confronting a dramatic increase in litigation, regulations, and compliance scrutiny. Read this paper to find out more.