Company Security RegulationcomputerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Company Security Regulationcomputer returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Endpoint Security
 •   Wireless Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Network Management
 •   Anti-Virus Solutions
 •   Security Monitoring
 •   Localization, Globalization and Translation

Related Searches
 •   Basics Of Company Security
 •   Company Experts
 •   Company Security History
 •   Company Security Integration
 •   Company Security Knowledge
 •   Company Security Program
 •   Company Security Solution Software
 •   Guides Company Security
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Business Continuity Management by Matrix42

September 2008 - (Free Research)
This White paper explains the concept of Business Continuity and demonstrates how matrix42 Empirum supports the Business Continuity Strategy in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

Managed Office Protection: Switching from AV to SaaS by Panda Security

March 2008 - (Free Research)
Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Energy and Utilities Companies by IBM

July 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Unprotected Laptops: The Million Dollar Gamble: How Much Can Your Company Afford to Lose? by Dell, Inc. and Intel®

January 2009 - (Free Research)
Read this white paper to learn more about laptop security and how asset and data protection solutions from Dell can help save your company millions of dollars. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

5 Backup Features to Ensure Compliance by APTARE

June 2013 - (Free Research)
In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for a Next-Generation SIEM: Delivering Operational Efficiency and Lower Costs Through An Integrated Approach to Network Security Management by Q1 Labs, an IBM Company

October 2010 - (Free Research)
The selection of the most effective IT technology is a major concern for companies of all sizes, across almost every industry. Read this white paper to learn more about how Q1 Labs' next-generation security information and event management solutions can help protect your IT assets at a lower cost to the company. 
(WHITE PAPER) READ ABSTRACT |

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

Regulations Shift Focus on Outbound Email Security by Proofpoint, Inc.

July 2008 - (Free Research)
Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

Leverage Security Intelligence for Energy and Utilities Companies by IBM

July 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention Requirements Roadmap by CA Technologies.

April 2009 - (Free Research)
The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data. 
(WHITE PAPER) READ ABSTRACT |

The Best PCI Audit of Your Life by Lumension

August 2009 - (Free Research)
This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life. 
(WHITE PAPER) READ ABSTRACT |

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Computer Weekly - 3 April 2012: Data security best practice by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project. 
(EZINE)

Webcast - Closing the Four Security Risk Gaps of Mainframe Console Access by I/O Concepts Inc.

December 2008 - (Free Research)
The information presented in this webcast can help you be sure your company's commitment to security includes all levels of mainframe access. 
(WEBCAST) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored by Sophos, Inc.

September 2009 - (Free Research)
This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media. 
(WHITE PAPER) READ ABSTRACT |

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies by ArcSight, an HP Company

August 2010 - (Free Research)
The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack. 
(WHITE PAPER) READ ABSTRACT |

Closing the Circle: How to Get Manageable Endpoint, Mobile Device and Web Security Together by IBM

March 2013 - (Free Research)
This whitepaper discusses why it is necessary to implement security solutions that protect endpoints and mobile devices together, and to discover one company's suggestions for ameliorating this area of vulnerability within your organisation. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Balancing compliance with information security threat assessment by SearchSecurity.com

November 2011 - (Free Research)
Implementing the rules and regulations of a specific industry can be difficult, making it hard for companies to accomplish the task at hand: being successful. In this expert E-Guide, you will learn that the hassle of compliance is worth it in the long run for your company and can be worked into your everyday culture. 
(EGUIDE) READ ABSTRACT |

The various ways to fight new and emerging cybercrime by SearchSecurity.com

November 2011 - (Free Research)
Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts