Compliance White Papers

Results 1 - 25 of 478Sort Results By: Published Date | Title | Company Name
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: IBM     Published Date: Jul 22, 2015

Driving transformation in the healthcare industry as it navigates technological, regulatory, legislative and cultural changes.

Tags : it healthcare, cloud computing, cloud security, hybrid cloud, regulatory compliance, it infrastructure, healthcare organizations, data management
    
By: IBM     Published Date: Jul 22, 2015

Learn about the five key recommendations Corporate banks should consider in order to be successful in this customer-centric banking environment.

Tags : productivity, customer service, automation, automated financial transactions, compliance, customer retention, customer satisfaction, best practices
    
By: Citrix Systems     Published Date: Jul 17, 2015

Why app and desktop virtualization should be the foundation for your layered approach.

Tags : information security, layered approach, mobility, application, desktop virtualization, application security, compliance, application integration
    
By: Citrix Systems     Published Date: Jul 17, 2015

Reduce the work need to provide better security.

Tags : data, data protection, access control, security task, application, desktop virtualization, compliance, business intelligence
    
By: IBM     Published Date: Jul 15, 2015

How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.

Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction, application security
    
By: IBM     Published Date: Jul 15, 2015

This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe

Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
    
By: IBM     Published Date: Jul 15, 2015

How to create proactive big data security and privacy strategies

Tags : data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations.

Tags : endpoint management, path compliance, lifecycle management, patch management, vulnerability management, endpoint security, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.

Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.

Tags : security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance
    
By: IBM     Published Date: Jul 15, 2015

Examining the business ramifications of various fraud-prevention technology approaches.

Tags : fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management, malware prevention, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the state of today’s cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.

Tags : cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
By: VMware, Inc.     Published Date: Jul 10, 2015

Evaluating hybrid cloud for workloads.

Tags : reliability, application, security, compliance, application, application security, high availability, application integration
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: Kaseya     Published Date: May 13, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, disaster recovery
    
By: Windstream     Published Date: May 06, 2015

Read this Gartner report to learn how to keep business up and running no matter what.

Tags : business continuity, windstream, gartner, it service, analysis, compliance, disaster recovery, web service security
    
By: AllClearID     Published Date: Apr 23, 2015

A Study of Actual Payouts for Covered Data Breaches. **This white paper was published by NetDiligence**

Tags : network security, security policies, disaster recovery, compliance, business continuity, internet security
    
By: AllClearID     Published Date: Apr 23, 2015

Use this Incident Response Workbook to begin planning a well-orchestrated response in the event of a data breach. Download the workbook now.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, compliance, disaster recovery
    
By: NAVEX Global     Published Date: Mar 18, 2015

Get the inside track on the key ethics and compliance industry trends that will impact your business in 2015—and get the resources you need to help you plan for the year ahead.

Tags : ethics and compliance, ethics trends, compliance
    
By: NAVEX Global     Published Date: Mar 18, 2015

In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.

Tags : compliance, software compliance
    
By: 123Together     Published Date: Feb 05, 2009

Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity

Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.