Regulatory Compliance Research
-
The Information Agenda: Rapidly Leveraging Information as a Trusted Strategic Asset for Competitive Advantage
Sponsored by: IBMAs the CIO of a flourishing business, you are happy to report that the current information projects are going well. The new call center is up and running, the new data warehouse is on-line, and the new customer loyalty systems have been deployed successfully.
-
Test and simulate rules using WebSphere ILOG Business Rules Management System
Sponsored by: IBMLearn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
-
Case Study: Northern Trust Turns To Google For More Accurate and Relevant Search
Sponsored by: Google Search ApplianceIn order to ensure regulatory compliance, Northern Trust's IT department needed a better tool to help employees quickly find the latest forms and information. Using the Google Search Appliance, OneBox and User-Added Results, Northern Trust increased both the accuracy and relevance of all intranet searches. Read this case study.
-
Presentation Transcript: Why You Need To Create An ESI Strategy
Sponsored by: Iron MountainElectronically stored information (ESI) has become an integral part of organizations today – so it is necessary to understand the compliance regulations and best practices that come along with ESI. Find out how to create and maintain an ESI system that eases e-discovery requirements, and more.
-
November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
Sponsored by: Information Security MagazineNovember's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
-
Windows 7 and Desktop Lockdown with Privilege Management
Sponsored by: ViewfinityWith the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown. Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments.
-
E-Book: Technical Guide on Web Application Firewalls
Sponsored by: TechTarget SecurityWeb application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
-
Seven Keys to Making or Breaking Your Exchange Infrastructure
Sponsored by: Dell SoftwareExchange Server 2007 changed the way your communications infrastructure operated forever, delivering a potent and powerful e-mail engine. And with Exchange Server 2010, Microsoft’s upped the ante, delivering a more powerful feature set and functionality. But does all of this mean bigger management headaches?
-
Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
Sponsored by: GoogleVolume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
-
Why Virtualize?
Sponsored by: AT&T CorpThis paper explains the potential benefits and key decisions associated with virtualization projects and how to get started.
-
Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
Sponsored by: Information Security MagazineThis issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
-
Delivering Enterprise Value with Oracle Governance, Risk & Compliance
Sponsored by: Oracle CorporationIn this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients.
-
Solutions Brief: Oracle Solutions for Governance, Risk and Compliance
Sponsored by: Oracle CorporationRead this white paper to learn about Oracle’s comprehensive GRC platform and how leading enterprises are turning to Oracle’s new platform to meet the demands of increasingly challenging regulatory mandates while continuing to innovate and grow their business.
-
Webcast: Active Directory Recovery with Windows Server 2008 R2
Sponsored by: Dell SoftwareIn this new Quest on-demand webcast, get a peek at the Active Directory Recycle Bin in action. Then, find out how a powerful third-party solution simplifies the entire recovery process to not only quickly and easily restore deleted objects, but to roll back attributes too.
-
E-Book: NERC Compliance
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
-
The Top 10 Reasons to Automate Your AP Processes
Sponsored by: Kofax, Inc.This white paper examines in detail the relevant issues and benefits of Accounts Payable (AP) transformation as well as recent industry-wide research and best practices around such initiatives.
-
E-Book: Smart Virtualization Decisions
Sponsored by: Dell, Inc. and Intel®This e-book provides a roadmap to virtualization success for CIOs and strategic IT. Topics include: how to align virtualization with business priorities, virtualization beyond the server has its rewards, maintaining compliance in virtual environments, and futureproofing your virtualization roadmap.
-
The Future of Address Validation: Going Beyond Move Update to Cut Costs and Connect with Customers
Sponsored by: Pitney Bowes Business InsightToday, the need to connect with customers efficiently and effectively is more important than ever. The foundation of these communications is a complete and accurate customer record. This paper describes the validation requirements, opportunities and best practices to increase organizational efficiencies relative to enterprise address validation.
-
Database Security: Audit and Protect Critical Databases
Sponsored by: ImpervaDatabases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
Risk Never Sleeps: Managing Risk in an Uncertain World
Sponsored by: SunGard Availability ServicesIT professionals are increasingly responsible for doing more than just provisioning servers and maintaining applications – they are core players in the risk management process. Read this whitepaper to learn more.
-
Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
Sponsored by: MimecastThe market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
-
E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements
Sponsored by: MimecastMimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.
-
How the Guardium Platform Helped Dell IT Simplify Enterprise Security
Sponsored by: Guardium, an IBM CompanySafeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.
-
Protection Starts with Security Management Solutions from Novell
Sponsored by: Novell, Inc.Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
-
Identity and Access Management: You Have to Be Compliant, You Want Security and Efficiency. Why Not Get it All?
Sponsored by: Dell SoftwareLearn how to not only meet your compliance challenges, but improve security and operational efficiency. In this business brief by Quest Software, discover how to extend the power of Active Directory and Windows Group policy, and make it easy to achieve and prove compliance.