Security Policies Research
-
Avoid HIPAA Compliance Violations Amid the Rise of BYOD
Sponsored by: ImprivataThis expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
-
Taking Managed Security Services To The Next Level
Sponsored by: OpenText Security SolutionsThis white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
-
Policy Based Encryption: Protecting your Business Against Email Risks
Sponsored by: ApptixThis white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
-
Data Privacy: Where Should I House My Data?
Sponsored by: IntraLinks, IncThis white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
-
Eagle Bank Keeps Deposits and Customer Data Safe
Sponsored by: ImprivataThis case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
-
Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
Sponsored by: ImprivataThis case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
-
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
Sponsored by: ImprivataThis case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
-
The CIO’s Guide to HIPAA Compliant Text Messaging
Sponsored by: ImprivataThis resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
A More Secure From Door: SSO and Strong Authentication
Sponsored by: ImprivataThis white paper guides you through the advantages of strong authentication, and helps you decide which strategies and solutions best fit your business needs.
-
Avoiding Compliance and Shadow IT Risks in the Cloud
Sponsored by: CloudPassageThis expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
-
Chalk Talk: Simplify User Access with NetIQ Solutions
Sponsored by: NetIQView this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
-
Secure Network Access for Personal Mobile Devices
Sponsored by: CiscoThis resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
-
Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
Sponsored by: NetIQThis resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
-
The Safe On-Ramp to Big Data
Sponsored by: InformaticaThis white paper examines the risk and reward of big data and highlights how leading organizations are utilizing Informatica technology as a safe on-ramp to big data that reduces risk and cost while speeding insights and innovation.
-
Dell Data Protection
Sponsored by: DellEMC and Intel®This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
-
Leverage Security Intelligence for Government Agencies
Sponsored by: IBMThis resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
-
A New Standard for Security Leaders. Insights from the 2013 IBM CISO Assessment
Sponsored by: IBMThis guide discusses security leaders' top concerns with today's aggressive threat landscape.
-
Discover How Mail Express Solves 2 of Your Biggest IT Headaches
Sponsored by: GlobalscapeMail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
-
Real-world Identity and Access Management (IAM) for Legacy Operating Systems
Sponsored by: Dell SoftwareThis white paper discusses the common challenges facing organizations that stick with legacy operating systems. Access now for easily implemented best practices and technologies that mitigate these concerns.
-
Business Driven Governance: Managing Policies for Data Retention
Sponsored by: IBMThis resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
-
Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
Sponsored by: IBMThis resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
-
Unified Communications Security
Sponsored by: NextPlaneThis crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
-
IAM for the Real World – Privileged Account Management
Sponsored by: One IdentityRead this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
-
Securing your Midsized Business
Sponsored by: IBMThis guide explores security management strategies and how to combat the growth of sophisticated threats.