Regulatory Compliance Research
-
Security Intelligence Is the Smart Way to Keep the Cloud Safe
Sponsored by: IBMFind out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
-
Four steps to ensure IT investments benefit regulatory compliance
Sponsored by: Hewlett Packard EnterpriseIn this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Lake Health Enhances Patient Experience with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseUncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
-
Keeping Distributed Endpoints Safe and Compliant
Sponsored by: IBMKeeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
-
Improved Scalability and Availability are the Keys to Better Storage Management
Sponsored by: EMC & ArrowThis white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
-
Executive Guide to SYSPRO Security for Auditing Assurance and Control
Sponsored by: SysproThis white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
-
Best practices in managing requirements in Energy and Utilities industries
Sponsored by: IBMThis webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Simple Strategies for BYOD Compliance
Sponsored by: CDW CorporationThis expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.
-
Business Driven Governance: Managing Policies for Data Retention
Sponsored by: IBMThis resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
-
Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
Sponsored by: IBMThis resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
-
The ROI of a New Learning Management System (LMS): How to Construct a Successful Business Case
Sponsored by: SuccessFactorsThis resource describes key features and capabilities of a new-generation learning management system (LMS), and counts down six steps for demonstrating LMS value, rooted in ROI. Learn how you can make a successful business case for an LMS by reading on now.
-
An Expert Guide to the PCI DSS 3.0
Sponsored by: TechTarget SecurityThis expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
-
Demand More From Your Data Center Environment
Sponsored by: Iron MountainThis resource introduces a colocation strategy that offers more than just space and power to help you optimize your data center operations, achieve compliant IT security, and more.
-
Welcome to Iron Mountain’s National Data Center
Sponsored by: Iron MountainThis brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.
-
New Data Center Designs Go Underground for Energy Efficiency
Sponsored by: Iron MountainThis resource introduces a service that's changing the data center colocation model by delivering the key capabilities and functions you need to align your data center infrastructure with disaster recovery requirements and fuel success.
-
Data Center Designs to Help Meet Your Compliance Challenge
Sponsored by: Iron MountainThis valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
-
Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10
Sponsored by: BlackBerryThis exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.
-
Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act
Sponsored by: AbsoluteThis brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.
-
Million Dollar HIPAA Penalties for Healthcare
Sponsored by: AbsoluteThe threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
-
Flash: Maximo Asset Management for Healthcare Organizations
Sponsored by: IBMThis brief video describes an asset management tool that can help you meet the challenges of an evolving healthcare landscape. Tune in to learn how you can increase productivity and asset utilization, manage compliance, lower costs, and more.
-
Reducing the costs and risks of data storage in the federal government
Sponsored by: IBMThis resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
-
6 Steps to SIEM Success
Sponsored by: AT&T CybersecurityIn this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
-
October 2013 Health IT E-Zine
Sponsored by: TechTarget Health ITIn this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.