Compliance White Papers

Results 1 - 25 of 437Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 09, 2015

Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.

Tags : ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security, business continuity
    
By: Kaseya     Published Date: Mar 12, 2015

Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.

Tags : automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations
    
By: 123Together     Published Date: Feb 05, 2009

Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity

Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
    
By: Citrix Systems     Published Date: Apr 15, 2015

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, migration, network architecture
    
By: NAVEX Global     Published Date: Mar 18, 2015

Get the inside track on the key ethics and compliance industry trends that will impact your business in 2015—and get the resources you need to help you plan for the year ahead.

Tags : ethics and compliance, ethics trends, compliance
    
By: NAVEX Global     Published Date: Mar 18, 2015

In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.

Tags : compliance, software compliance
    
By: CDW     Published Date: Feb 24, 2015

Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.

Tags : software piracy, software vendors, audit, software licenses, software compliance, piracy misconceptions, auditing, compliance
    
By: Docusign     Published Date: Feb 19, 2015

À cause du nombre croissant de professionnels qui utilisent les téléphones et applications mobiles, la « vague mobile » a des incidences sur chaque fonction commerciale dans le monde entier et modifie la manière de faire des affaires. Les technologies telles que les signatures électroniques mobiles peuvent aider les entreprises à finaliser leurs transactions commerciales. Les signatures électroniques mobiles vous permettent, ainsi qu'à vos contacts, d'envoyer et de signer des documents légalement, grâce aux téléphones et à d'autres appareils mobiles, à tout moment et en tout lieu.

Tags : docusign, la signature electronique, compliance
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Micro Focus     Published Date: Aug 28, 2014

Enabling technologies to streamline regulatory and legislative changes.

Tags : it compliance programs, risk management, it management, data management, compliance
    
By: Micro Focus     Published Date: Aug 28, 2014

Deliver value back to the business faster than before with the Micro Focus Enterprise solution set. Micro Focus' products for IBM zEnterprise make your mainframe work even smarter. Successfully achieve rapid Time to Value of core mainframe applications, helping tackle the growing IT innovation, maintenance and compliance backlog. Faster application service delivery is achieved through technology that transforms mainframe application analysis, modernization, development, testing and workload optimization.

Tags : mainframe, core applications, it innovation, data management, compliance
    
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: CenturyLink Technology Solutions     Published Date: May 22, 2014

Read “Linedata Launches SaaS-Based Offering and Expands Global Reach with Markets Infrastructure” now, and learn how Linedata partnered with CenturyLink to expand its product offerings and achieve a global presence.

Tags : centurylink, agile it, it infrastructure, network infrastructure, data center, networking, infrastructure, network architecture
    
By: Mimecast     Published Date: May 15, 2014

This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, access control
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: Bit9     Published Date: Apr 23, 2014

Download this white paper to learn the 9 strategies to think about when looking to take control of the security of your systems AND more easily maintain PCI compliance.

Tags : bit9, compliance, pci compliance, security, retail system, security solutions, validation, payment card security
    
By: Bit9     Published Date: Apr 23, 2014

This white paper explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : bit9, security, compliance, security solutions, visibility, detection, threat protection, cyber security
    
By: Bit9     Published Date: Apr 23, 2014

Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance.

Tags : bit9, security, compliance, data breach, cyber attack, threat protection, pci compliance, payment card industry
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Intralinks     Published Date: Nov 26, 2013

The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.

Tags : intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, compliance
    
By: SPAN Systems     Published Date: Aug 30, 2013

2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.

Tags : securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes
    
By: Kroll Advisory Solutions     Published Date: Aug 02, 2013

First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs. The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.

Tags : compliance, corruption, anti-bribery, risk assessment, compliance programs, compliance risk
    
By: Rapid7     Published Date: Jul 24, 2013

The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.

Tags : rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing
    
By: IBM     Published Date: Jun 26, 2013

An Economist Intelligence Unit research program commissioned by IBM.

Tags : holistic, risk management, business continuity planner, compliance, security management, quality assurance
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.