ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulatory Compliance Research

  • The Complete Guide to Log and Event Management

    Sponsored by: Novell, Inc.

    This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.

  • Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management

    Sponsored by: Novell, Inc.

    Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program.

  • Simplify Compliance and Security with Novell® SentinelT Log Manager

    Sponsored by: Novell, Inc.

    Finding a log management solution that can manage risk, simplify regulatory compliance and provide security for you network can be very difficult. There are many systems that contain some of these tools but now there is a system that can do all of this.

  • Records Management’s Breaking Point: Managing Electronic Records in High-Volume Environments

    Sponsored by: ASG Software Solutions

    This White paper outlines issues that make manging transactional electronic records challenging, demonstrates why organizations need to tame the high volume transactional records beast, and lastly, describes what to look for in a transactional electronic records management solution.

  • Magic Quadrant for Mobile Data Protection

    Sponsored by: Sophos

    This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  • IBM InfoSphere Guardium Data Redaction

    Sponsored by: IBM

    InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.

  • Data Privacy e-Book

    Sponsored by: TechTarget ComputerWeekly.com 

    SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.

  • 7 Reasons Businesses are Shifting to Cloud Backup

    Sponsored by: CoreVault

    Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.

  • E-Guide: 6 Things Every New MSP Needs to Know about the Business

    Sponsored by: Nimsoft, Inc.

    While many VARs, integrators and solution providers are offering “services,” there remains a substantial portion that either have only a small amount of revenue coming from managed services or no managed services practices at all. This guide will walk you through the 6 best practices you need to know about being a managed service provider.

  • E-Guide: GARP and How it Helps you Achieve Better Information Governance

    Sponsored by: IBM

    This e-guide answers the most frequently asked questions about information governance and GARP. Continue reading to get a firm introduction to GARP and information governance as a whole.

  • E-Guide: Planning for virtualized disaster recovery in a health care setting

    Sponsored by: BridgeHead Software

    Many enterprises have embraced virtualized disaster recovery because it restores functions with minimal hardware. Health care orgs can do this too, if they keep HIPAA in mind. Check out this e-guide for more information about planning your virtualized disaster recovery in a health care setting.

  • FlexNet and FDA 21 CFR Part 11

    Sponsored by: Apriso Corporation

    Manufacturers regulated by the FDA 21 CFR Part 11 regulations understand that the integrity of manufacturing processes must be achieved and maintained in order to sustain compliance. The purpose of this document is to demonstrate that Apriso FlexNet platform and application suite can support the intent of the 21 CFR Part 11 regulatory guidelines.

  • The Complete Guide to Log and Event Management

    Sponsored by: Novell, Inc.

    This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.

  • Simplify Compliance and Security with Novell® Sentinel™ Log Manager

    Sponsored by: Novell, Inc.

    Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware.

  • Protection Starts with Security Management Solutions from Novell

    Sponsored by: Novell, Inc.

    Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security - an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    Sponsored by: ArcSight, an HP Company

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • ArcSight Logger: Universal Log Management Solution

    Sponsored by: ArcSight, an HP Company

    ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.

  • Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance

    Sponsored by: Silver Tail Systems

    This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks.

  • How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g

    Sponsored by: Miro Consulting, Inc.

    Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII).

  • EMC VNXe Series Software Packs: Simple Data Protection and More

    Sponsored by: EMC Computer Systems (UK) Ltd.

    EMC has packaged unique and powerful add-on storage software into two attractively priced, easy-to-order software packs: Total Value Pack and Total Protection Pack available for the VNXe 3100 and VNXe 3300 respectively, ensuring maximum protection, security, and compliance.

  • Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation

    Sponsored by: Tripwire, Inc.

    This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.

  • Choosing a Cloud Provider with Confidence

    Sponsored by: GeoTrust, Inc.

    The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.

  • Migrating to Windows 7: How to Select a Provider for PC Online Backup and Recovery

    Sponsored by: Iron Mountain

    In addition to implementing strategic initiatives, IT has the basic function of keeping workers productive. With many enterprises migrating to Microsoft Windows 7, it is important to consider a backup provider that supports Microsoft’s latest platform. Read this white paper to learn more.

  • The Big Shift to Cloud-based Security

    Sponsored by: Qualys

    Access this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.

  • Records Management’s Breaking Point: Managing Electronic Records in High Volume Environments

    Sponsored by: ASG Software Solutions

    This white paper outlines some of the issues that make electronic records management so challenging, highlights why organizations need to tame the high-volume transactional records beast, and lastly, describes what to look for in a transactional records management solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.