ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance (Systems Operations) White Papers

  • 6 Critical Reasons for Office 365 Backup

    Sponsored by: Veeam Software

    Access this white paper to learn the 6 reasons why backing up Office 365 is critical so you can close security gaps before your data is compromised.

  • Analyzing the Economic Benefits of Proofpoint Insider Threat Management

    Sponsored by: Proofpoint

    With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.

  • Risk Management as Revenue Driver: An Adaptive Approach

    Sponsored by: LogicGate

    Recently, PwC interviewed 1,535 executives in risk functions from 76 countries and across 30 different industries. They used this information to serve as models in their successful approaches to risk. These “Adapters,” as they’re called, were effective in tackling innovation-related risks. Read this article to see why they stood out.

  • Armor Anywhere With Secure Hosting

    Sponsored by: Armor

    Learn how to simplify compliance with Armor Anywhere with secure hosting.

  • Manage Security Risk with Red Hat Insights

    Sponsored by: Red Hat

    Access this white paper to learn about Red Hat Enterprise Linux, a tool that offers 5 key benefits for organizations looking to analyze, prioritize, and remediate issues as well as report their status.

  • What is Operational Resilience?

    Sponsored by: LogicGate

    According to Gartner, operational resilience is a set of techniques that allows people, processes and information systems to adapt to changing patterns. How do businesses not just prepare but succeed when faced with the unexpected? Read this quick article to get an understanding of how organizations comprehend their respective risk.

  • The Top 5 InfoSec Professional Challenges

    Sponsored by: LogicGate

    What keeps you up at night? If you’re anything like most risk and information security professionals, the list is long. Juggling security concerns, reporting on risk data, and managing the latest regulatory requirements all add up. To stay in the know, read the top 5 challenges infosec professionals face, and the common thread linking them all.

  • The Risk Cloud

    Sponsored by: LogicGate

    Approaches to risk management are shifting from reactive to proactive. Integrating risk management programs is a key to growth in today’s digital landscape. Many of the challenges involving risk, including lack of visibility and poor UX, can be solved through a more agile approach. Read this white paper to learn about the Risk Cloud and agile GRC.

  • Armor Secure Hosting Proactive Security for Payment Transactions and PCI Data

    Sponsored by: Armor

    Businesses requiring PCI compliance are in between a rock and a hard place when it comes to continuity. They need to be able to scale, but various security vulnerabilities introduce themselves through the process. Now, you can be both secure and compliant. Scan this data sheet on Armor Secure Hosting to learn how to proactively secure payments.

  • Security and Compliance for a Case Management SaaS

    Sponsored by: Armor

    When a private case management platform evolved into a software-as-a-service (SaaS) offering, a healthcare tech company needed a secure cloud-based solution that could help ensure HIPAA compliance. Read this comprehensive case study to learn about Armor Anywhere, a secure hosting platform designed with security and compliance in mind.

  • Cybersecurity Compliance Guide

    Sponsored by: Arctic Wolf Networks, Inc.

    Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.

  • TikTok Case Study

    Sponsored by: Lookout

    Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.

  • Achieving Security and Compliance for SAP HANA in the Cloud

    Sponsored by: Thales

    Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.

  • 3 Ways Modern Backup Supports Your Business During Uncertain Times

    Sponsored by: Cohesity

    With data volume continuing to grow, a simple and secure modern backup solution can help boost your organizational preparedness while supporting your IT efficiency, data recovery, and compliance goals. Access this data sheet to learn 3 ways modern backup can support your specific business during uncertain times.

  • The Sunshine Laws, Freedom of Information and Compliance

    Sponsored by: Egress Software Technologies Inc

    Learn how you can use Egress to minimize response time to information requests and avoid a costly violation.

  • GDPR vs CCPA

    Sponsored by: Auth0

    Inside this guide to GDPR vs. CCPA, discover what businesses need to know to close compliance gaps between the two laws and how Auth0’s identity management platform can help.

  • The 2020 State of Compliance and Security Testing Report

    Sponsored by: Synack

    The 2020 State of Compliance and Security Testing Report provides some conclusions on 2020 imperatives of security teams including program structure and ownership, compliance requirements, testing approach and vendor strategy. Read on to reveal the results.

  • How DivvyCloud Enables Continuous Multi-Cloud Security and Compliance Best Practices for CoStar During Mergers and Acquisitions

    Sponsored by: DivvyCloud

    CoStar, the leading provider of commercial real estate information, analytics, and online marketplaces needed to ensure security and compliance of their cloud footprint. Learn how DivvyCloud provides CoStar with control over their cloud resources in a way that supports their business model and culture.

  • Complying with APRA Prudential Standard CPS 234

    Sponsored by: Thales

    This white paper provides recommendations to APRA regulated entities on implementing key APRA practice guidelines (CPG 234) to comply with the requirements of CPS 234. Read on to get started.

  • Cloudian HyperStore Compliance Assessment

    Sponsored by: Cloudian

    In this e-book, Cohasset Associates has been called upon to assess the capabilities of Cloudian HyperStore. Read on to learn Cohasset’s opinion on HyperStore which includes whether or not it retains records requiring time-based retention in compliance with the recording and non-rewritable, non-erasable storage of electronic records.

  • The Value of Identity Governance for Financial Services

    Sponsored by: SailPoint Technologies

    Identity governance helps you answer three important questions: “who currently has access?”, “who should have access?” and “how is that access being used?”Learn how SailPoint enables you to answer these questions and establish a foundation that is continuously secure and compliant.

  • Nomura Automates and Scales Compliance Management with ServiceNow

    Sponsored by: ServiceNow

    Nomura Americas is part of the Nomura Group, a financial services organization based in Asia. With tightening regulations, Nomura needed to make compliance a top priority. Learn how Nomura was able to automate their legacy, manual compliance processes using ServiceNow IT Service Management.

  • SAP Compliance Risk Dashboard Appsian Real-Time Analytics

    Sponsored by: Appsian

    Compliance mandates such as SOX, GDPR, CCPA and others require organizations to maintain details of data access. View this data sheet to see how Appsian’s Compliance Risk Analytics dashboard equips SAP customers with direct, real-time visibility into the activity around high-risk business transactions.

  • Governance, Risk, and Compliance: Use Case Guide

    Sponsored by: ServiceNow

    Tap into this guide to see how an integrated risk program on a common platform can help continuously monitor for risk and compliance across the extended enterprise, holistically prioritize risk based on business impact to improve decision making, and much more.

  • HIPAA Compliance Checklist: The Key to Staying Compliant in 2020

    Sponsored by: Ostendio

    Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.