ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulatory Compliance Research

  • Rebuilding the Banking Landscape: Restoring Customer Confidence and Returning to Growth

    Sponsored by: Micro Focus, Ltd

    This paper looks at the ways that banks are having to adapt to rise to these challenges, the constraints they face and how innovative changes in IT infrastructure can release time, money and capacity to meet the demands of the new banking landscape.

  • When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure

    Sponsored by: Trend Micro, Inc.

    Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more.

  • E-Guide: Information Security Essential Guide to Compliance

    Sponsored by: Information Security Magazine

    Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.

  • The State of Privacy and Data Security Compliance

    Sponsored by: Sophos

    The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out.

  • Securing Virtualised Environments and Accelerating Cloud Computing

    Sponsored by: CA Technologies

    There is no question that virtualisation offers compelling tangible benefits for an IT organisation. Virtualisation is inevitable, and cloud computing is a new opportunity. Read this paper to learn about virtualisation security, the CA Access Control (AC) solution, and how to accelerate cloud computing.

  • Global Trends in Sustainability Performance Management

    Sponsored by: SAP America, Inc.

    This paper will present an overview of the changing landscape as companies develop practices and processes to measure their performance as sustainable enterprises. It will examine the complex new drivers of sustainability reporting, as well as the rapidly changing legislative environment that will make reporting mandatory, not voluntary.

  • Why Should Companies Take a Closer Look at Business Continuity Planning?

    Sponsored by: Datalink

    Over the last 30 years, companies have significantly changed their approach to ensuring that their businesses can continue to run in the event of a catastrophe. Read this white paper to learn how business continuity and disaster recovery solutions can help you to develop a more robust enterprise.

  • Solving Four Primary Security Challenges of Microsoft SharePoint

    Sponsored by: Sophos UK

    This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.

  • Scaling Scrum: Lessons from the Trenches

    Sponsored by: IBM

    Check out this webcast to learn how the Agile Scaling Model can be applied to tailor the Scrum lifecycle, roles, and practices to address scaling factors, including regulatory compliance, technical complexity, and organizational complexity.

  • PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements

    Sponsored by: IBM

    High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.

  • A Virtualization Roadmap from Dell and Intel

    Sponsored by: DellEMC and Intel®

    Virtualization is more than a technology. It is a way of thinking about problems that allow us to go beyond the physical limitations nor­mally associated with entire classes of hardware, from servers to storage. Attaining the maximum benefits of virtualization, however, requires a plan and constant monitoring to ensure peak performance.

  • Five Challenges to Continuous PCI DSS Compliance

    Sponsored by: Tripwire, Inc.

    As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them.

  • Log Management Best Practices

    Sponsored by: Hewlett Packard Enterprise

    In this presentation transcript, find out best practices in log management and how it affects the use of security dashboards. Also learn how log management differs from security information and event management (SIEM).

  • Pulling the Plug on Legacy Log Management

    Sponsored by: Tripwire, Inc.

    When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh.

  • Presentation Transcript: Building a Comprehensive Notes/Domino Archiving Strategy

    Sponsored by: Sherpa Software

    This presentation transcript explains why archiving Domino content (including email and applications) is necessary for most companies. Learn about current archiving tool trends and best practices for Domino. Discover how to enlist a strategy that will best fit your organization's archiving needs.

  • Secure File Transfer Solution Saves Bank Time and Money

    Sponsored by: Linoma Software

    Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.

  • Presentation Transcript: College of Virtualization - Lessons in Creating a Virtual Infrastructure for Cloud Computing

    Sponsored by: Dell and VMware

    This presentation transcript discusses the steps essential for creating a virtual infrastructure for cloud computing to improve the delivery of data center applications.

  • Virtualization Security: Achieving Compliance for the Virtual Infrastructure

    Sponsored by: Trend Micro

    What’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. Read this paper to learn about top trends in virtualization security, how virtualization poses unique challenges to compliance, and more!

  • Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers?

    Sponsored by: Guardium, an IBM Company

    This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program.

  • Presentation Transcript: College of Virtualization - Lessons in Integrating Data Protection Software

    Sponsored by: Dell and VMware

    In this SearchStorage.com presentation transcript, you'll see an overview of data protection software. You'll recieve some general advice, business and technology considerations, as well as some deployment considerations and configurations.

  • Beyond FTP: Securing and Managing File Transfers

    Sponsored by: Linoma Software

    Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol.

  • Presentation Transcript: SMB Server School - Considerations for Integrating Windows Server into a Virtual Environment

    Sponsored by: Dell, Inc. and Intel®

    This transcript explores the virtualization benefits of implementing Windows Server 2008 R2 in your organization. Receive best practices on how to effectively integrate R2 into your current infrastructure. Discover how this integration can enable your organization to increase the performance and reliability of its virtualized environment.

  • E-Book: IT in the Electronic Hospital

    Sponsored by: Imprivata

    The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.

  • Presentation Transcript: Enabling The Business Governance Of Data

    Sponsored by: ASG Software Solutions

    In this presentation transcript, Scott McCurdy, SVP of Business Solutions at ASG and featured guest Rob Karel, Principal Analyst at Forrester Research, discuss how enterprises are linking technical metadata to the formal management of business terms to achieve true enterprise data governance.

  • Information Security Magazine - February 2010: Under Control

    Sponsored by: Information Security Magazine

    Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.