ComputerWeekly.com Research Library

Powered by Bitpipe.com

Regulatory Compliance Research

  • Cloud Compliance Technical Guide

    Sponsored by: TechTarget Security

    Check out this expert technical guide for a global perspective on emerging cloud compliance issues.

  • IT Handbook: Getting Over the Cloud Adoption Hurdle

    Sponsored by: TechTarget Cloud Computing

    This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.

  • Recognizing the Value of Data Management in the Financial Sector

    Sponsored by: Bloomberg

    The combination of poor reference data management and the Dodd-Frank Wall Street Reform and Consumer Protection Act is creating a data management mess for many in the financial sector. Access this expert resource to explore how organizations can start preparing to meet new compliance regulations and increase data transparency.

  • Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements

    Sponsored by: IBM and SI Architects

    This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.

  • Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN

    Sponsored by: IBM and SI Architects

    In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    Sponsored by: TechTarget Security

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  • How to Manage Secure File Transfers to Meet Compliance Requirements

    Sponsored by: IBM and SI Architects

    This expert eGuide will help you learn how to maintain a balance between functionality and security when it comes to wide area network (WAN) file transfers. IT expert Dan Sullivan answers questions about WAN management and how to ensure secure transfers.

  • Sustainability: From Strategic Objective to Compliance Operation

    Sponsored by: HP & Intel®

    This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.

  • E-Discovery Cloud Considerations

    Sponsored by: Symantec Corporation

    In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.

  • Secure Web Gateway Overview: Implementation Best Practices

    Sponsored by: Sophos

    This expert e-guide outlines the essential best practices for deploying, configuring, and maintaining your secure Web gateway solution, allowing you to get the most out of your investment – click through to read more now.

  • BYOD Security Policy Considerations and Best Practices

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.

  • Presentation Transcript: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.

  • Holistic risk management: Perspectives for IT professionals

    Sponsored by: IBM

    Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.

  • Compliance Driven Security

    Sponsored by: DellEMC and Intel®

    With the increasing threat to credit card data, the Payment Card Industry Data Security Standard (PCI DSS) was introduced, requiring organizations to implement information security controls. Access this resource to learn more about the existing threats, the key benefits of PCI compliance and how to effectively implement a PCI compliance program.

  • E-Guide: Prioritizing Application Security Concerns

    Sponsored by: TechTarget Security

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

  • PCI in the cloud: Compliance guide

    Sponsored by: TechTarget Security

    Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals.

  • The changing SIEM landscape: What you should know to stay ahead

    Sponsored by: TechTarget Security

    While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.

  • Smarter Customers, Smarter Commerce: Innovations in the Banking Industry

    Sponsored by: IBM

    Banks today must reassess their business models and focus more on efficiency, data collection and risk management in order to stay competitive. Uncover a unique framework that can help meet your business objectives and allow for better data management in the highly regulated financial industry.

  • The Need for Cloud Computing Security Standards

    Sponsored by: TechTarget Security

    While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.

  • April Essential Guide to Data Protection

    Sponsored by: TechTarget Security

    In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.

  • Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements

    Sponsored by: Oracle Corporation

    Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.

  • February Technical Guide on Cloud Compliance

    Sponsored by: TechTarget Security

    In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.

  • Continuous Monitoring: Responding to New Threats in More Complex IT Environments

    Sponsored by: Tripwire, Inc.

    Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.

  • Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World

    Sponsored by: Tripwire, Inc.

    In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.

  • Counterparty Risk: Are We Leveraging Our Tools?

    Sponsored by: Sybase, an SAP company

    While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.