ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance (Systems Operations) Research

  • Securing and Controlling Sensitive Data in the Cloud

    Sponsored by: Trend Micro

    This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.

  • QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats

    Sponsored by: IBM

    This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.

  • Who’s Snooping on Your Email?

    Sponsored by: Sophos

    This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.

  • Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)

    Sponsored by: Trend Micro

    Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.

  • Enterprises Have Room for Improvement in Secure IT Asset Disposition

    Sponsored by: Iron Mountain

    Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.

  • Compliance Management's Seven Steps to Success

    Sponsored by: Infoblox

    Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.

  • Best Practices for Lawful Intercept in Enterprise and Service Provider Networks

    Sponsored by: Ixia

    It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.

  • Fighting Back Against Network Complexity

    Sponsored by: Infoblox

    Network management is becoming increasingly difficult, costly and time-consuming. Legacy manual procedures cannot keep up with today's complex networks. Read this white paper to learn why implementing network automation is critical to managing your network.

  • Expert Strategies: How to Adapt to Social Media While Making Sure You Stay Compliant

    Sponsored by: Bloomberg

    In this expert white paper, gain insight on how to successfully keep compliant while protecting your business from the potential risks associated with using social media as a business tool.

  • Mapping Security For Your Virtual Environment

    Sponsored by: Hewlett Packard Enterprise

    In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • Plas Plastic Case Study: Virtualization Delivers Greater Flexibility

    Sponsored by: Dell EMC and Microsoft

    In this case study, see how one organization is benefiting from virtualizing its networks for a more scalable, efficient, and reliable IT infrastructure that is prepared for continuous growth and productivity.

  • Clearswift Government Communications 2.0

    Sponsored by: Clearswift

    In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.

  • Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data

    Sponsored by: OpenText

    In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.

  • Rentokil Initial Improves Software Asset Management

    Sponsored by: Flexera Software

    Rentokil Initial, one of the largest business services companies in the world, was struggling with managing their software assets. In this case study, find out how Rentokil was able to implement a mature software asset management process and gain complete control over their software licenses, for reduced costs and lower risk.

  • Are Your File Transfer Methods Compliant?

    Sponsored by: OpenText

    This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.

  • Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management

    Sponsored by: Lumension

    In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.

  • Corporate Data in the Consumer Cloud, Chapter 3

    Sponsored by: TechTarget Mobile Computing

    Cloud-based services can reduce costs, boost storage capabilities and improve management tasks. But consider security and other factors if you're considering a cloud-based app.

  • PCI DSS Simplified: What You Need to Know

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.

  • Eight Tips to Safeguard Your Business Information

    Sponsored by: Iron Mountain

    Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • File Archive: the next big thing?

    Sponsored by: EMC Corporation

    Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.

  • Industry Credentials Insurance

    Sponsored by: Azzurri

    These top case studies highlight three UK insurance providers and their networking challenges with enhancing customer experience and increasing customer loyalty through better communication and end-user engagement, and how they found a solution that streamlined contact management and more.

  • Crafting a Secure Approach to Mobility and Compliance

    Sponsored by: TechTarget Mobile Computing

    This expert resource discusses key security features that need to be addressed when creating an effective mobile strategy, including how you can ensure compliance. Read on and learn about crucial topics such as encryption, data protection, and mobile application management.

  • Gamania Group tightens security to strengthen game development capability

    Sponsored by: Hewlett Packard Enterprise

    Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.