Cobra Compliance Systems Inc SoftwareWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Cobra Compliance Systems Inc Software returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Policies
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Treasury / Cash / Risk Management
 •   Managed Security Services
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Virtualization

Related Searches
 •   Cobra Outsource
 •   Conferences Cobra Compliance
 •   Conversion Cobra
 •   Demand Cobra
 •   Filing Cobra Compliance
 •   International Cobra
 •   Internet Based Cobra Compliance Systems
 •   Licenses Cobra Compliance
 •   Manual Cobra Compliance
 •   Rfq Cobra Compliance Systems
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program by Qualys, Inc.

May 2008 - (Free Research)
CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations. 
(CASE STUDY) READ ABSTRACT |

Presentation Transcript: Backup and Archive Are Not the Same Thing! by Symantec Corporation

September 2009 - (Free Research)
Discover some of the challenges you'll face when compliance mandates a retention policy that just doesn’t make sense, and learn about some alternate solutions to backup and archiving you may not have considered yet. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Complete Guide to Log and Event Management by Novell, Inc.

May 2011 - (Free Research)
This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together. 
(WHITE PAPER) READ ABSTRACT |

Logs: Data Warehouse Style by LogLogic, Inc.

September 2008 - (Free Research)
The LogLogic Log Management Data Warehouse enables organizations to centralize log data for easy, efficient access -- ensuring IT security, regulatory compliance, and operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

Cisco Security Solutions - A Reference Guide by Cisco Systems, Inc.

June 2009 - (Free Research)
This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives. 
(WHITE PAPER) READ ABSTRACT |

Identify and Destroy: Your Two-Step Ticket to Easier Information Compliance by Iron Mountain

June 2013 - (Free Research)
This brief white paper provides a two-step ticket to easier information compliance. Discover three steps to speed and recovery and how to identify and destroy data that is no longer relevant to your business needs. 
(WHITE PAPER) READ ABSTRACT |

Converting to the Cloud and Tackling the Challenges Within by Tenable Network Security (E-mail this company)

October 2013 - (Free Research)
In this expert e-guide, discover how to convert your company to the cloud. Security experts will take you through the positives and negatives of investing in the cloud and bring to light the compliance challenges that may arise when doing so. 
(EGUIDE) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

July 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

Five Ways to Reduce Costs and Drive Higher Efficiencies in Government by IBM

June 2011 - (Free Research)
This white paper describes five cost reduction strategies, supported by concrete examples of government agencies that have improved quality of services to citizens while cutting costs. 
(WHITE PAPER) READ ABSTRACT |

The Complete Guide to Log and Event Management by Novell, Inc.

March 2011 - (Free Research)
This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments. 
(WHITE PAPER) READ ABSTRACT |

Identity and Access Management Security Live Chat Transcript by SailPoint Technologies

May 2013 - (Free Research)
In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Escaping PCI purgatory by IBM

February 2009 - (Free Research)
IBM offers comprehensive solutions designed to take businesses through the entire PCI compliance process and continue to meet new requirements, supporting the next level of security. Read the white paper ‘Escaping PCI Purgatory’ to learn more. 
(WHITE PAPER) READ ABSTRACT |

Symantec IT Compliance Solution by Symantec Corporation

March 2009 - (Free Research)
Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more. 
(ARTICLE)

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation by BWise

October 2010 - (Free Research)
This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization. 
(EGUIDE) READ ABSTRACT |

An Executive's Guide to Cutting HR Costs by TriNet

December 2007 - (Free Research)
HR is a tremendously important resource in the business equation, but finding ways to cut its cost isn't easy. 
(WHITE PAPER) READ ABSTRACT |

IBM Platform Computing Maximizes CME Group's Computation Power and Performance by IBM

August 2013 - (Free Research)
This video case study details the solution one company went with to increase their data center power while maintaining compliance. 
(VIDEO) READ ABSTRACT |

Stimulus eBook by SAP America, Inc.

August 2009 - (Free Research)
THE STIMULUS PACKAGE. Learn what the stimulus package means for growing businesses. Download now. 
(EBOOK) READ ABSTRACT |

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa by SearchCompliance.com

February 2010 - (Free Research)
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards. 
(EBOOK) READ ABSTRACT |

IT Briefing: SIEM 3.0: The Next Generation of Security and Compliance Monitoring by ArcSight, an HP Company

October 2008 - (Free Research)
Read this IT briefing to learn more about interesting trends in the security information and event monitoring (SIEM) industry. 
(WHITE PAPER) READ ABSTRACT |

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World by Black Duck Software

July 2008 - (Free Research)
Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company. 
(WHITE PAPER) READ ABSTRACT |

Simplify Compliance and Security with Novell® Sentinel™ Log Manager by Novell, Inc.

March 2011 - (Free Research)
Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware. 
(WHITE PAPER) READ ABSTRACT |

Guide to Effective Remediation of Network Vulnerabilities and Policy Compliance by Qualys

November 2008 - (Free Research)
This guide describes the major workflow processes of vulnerability management and how QualysGuard, as an on demand software-as-a-service automates most of these for fast, cost-effective remediation and compliance documentation. 
(WHITE PAPER) READ ABSTRACT |

Configuration and Change Management for IT Compliance and Risk Management by Tripwire, Inc.

November 2007 - (Free Research)
This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements. 
(WHITE PAPER) READ ABSTRACT |

HP Database Archiving Software by Hewlett-Packard Information Management Software (IM)

August 2011 - (Free Research)
This comprehensive paper demonstrates how data management and HP database Archiving software solves the problems that arise as a result of increased database size and unmanaged growth in production databases. 
(WHITE PAPER) READ ABSTRACT |

LogRhythm and PCI Compliance by LogRhythm, Inc.

September 2009 - (Free Research)
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts