Compliance ProtocolWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance Protocol returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Network Management
 •   Network Protocols
 •   Networks
 •   Enterprise Data Protection and Privacy
 •   Access Control
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions

Related Searches
 •   Compliance Displays
 •   Compliance Protocol Conversions
 •   Compliance Protocol Desktop
 •   Compliance Tools
 •   Flowchart Compliance Protocol
 •   Integrated Compliance
 •   Products Compliance
 •   Public Compliance Protocol
 •   Records Compliance Protocol
 •   Sample Compliance Protocol
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Digital Trust in the Cloud: Liquid Security in Cloudy Places by CSC

November 17, 2011 - (Free Research)
While some individual users are experimenting with cloud processing, other users have already fully committed to the cloud as an important part of their enterprise architecture and operation. Read this white paper to learn about the evolution of cloud processing and whether or not the cloud processing boom will continue. 
(WHITE PAPER) READ ABSTRACT |

Forum Sentry™ - Web Services Security Gateway - Drive Return on Investment by Forum Systems

Forum Sentry™ provides a security infrastructure that drives a return on investment by enabling secure XML and Web services communications for mission critical applications. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Effective Risk Management in a Collaboration Driven Enterprise by AvePoint, Inc.

August 01, 2008 - (Free Research)
How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability. 
(WHITE PAPER) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 15, 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Web Threats: Challenges and Solutions by Trend Micro, Inc.

January 12, 2009 - (Free Research)
Read this white paper to better understand Web threats and their impacts, as well as why conventional methods fail to protect against these threats and the characteristics of a new approach required to ensure security, regulatory compliance, and business continuity. 
(WHITE PAPER) READ ABSTRACT |

Facilitating Enterprise PCI DSS Compliance - Executive Summary by GlobalScape

April 2008 - (Free Research)
The GlobalSCAPE HS-PCI solution provides a comprehensive mechanism to quickly bring your organization into compliance with key requirements. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager by Novell, Inc.

December 2009 - (Free Research)
Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise. 
(WHITE PAPER) READ ABSTRACT |

NFS Evolution Changes the Landscape of HPC Data Management by BlueArc Corp.

July 2009 - (Free Research)
In HPC data management, traditional standards-based solutions have been limited in performance and scalability, but proprietary, high-performance solutions have required specific expertise to set up, manage, or scale. Read this Tabor Research White Paper to learn about file systems used in HPC environments as well as BlueArc storage solutions. 
(WHITE PAPER) READ ABSTRACT |

Transferring Data without Secure Protocols? by GlobalScape

May 2014 - (Free Research)
This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive. 
(WHITE PAPER) READ ABSTRACT |

Transferring Data without Secure Protocols? by IBM

May 2014 - (Free Research)
This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive. 
(WHITE PAPER) READ ABSTRACT |

Document Solutions IP Faxing versus Conventional Faxing: A Critical Analysis by Premiere Global Services

October 2008 - (Free Research)
This white paper uses examples in three industries with the heaviest fax usage - finance, healthcare, and insurance - to demonstrate costs and risks that are shared across all industries. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Examining Control System Security and Compliance by ArcSight, an HP Company

November 2010 - (Free Research)
This paper will provide an overview of cyber threats and regulations within critical infrastructure specific to control system environments. The paper will then present a general overview of control system architecture and identify common vulnerabilities within these environments. 
(WHITE PAPER) READ ABSTRACT |

File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement by Attachmate Corporation

August 2010 - (Free Research)
Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Web Application Security: Protect Your Critical Web Applications by Imperva

August 2010 - (Free Research)
To combat complex and distributed attacks, organizations need to protect their Web sites from new and emerging threats without affecting application performance or uptime. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

The Complete Network Assessment by Dorado Software

November 2008 - (Free Research)
This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network. 
(WHITE PAPER) READ ABSTRACT |

EtherScope™ Series II: Network Assistant by Fluke Networks

September 2010 - (Free Research)
Network professionals rely on the EtherScope Network Assistant to complete their daily tasks fast. The purpose-built EtherScope speeds and simplifies network installation, validation and troubleshooting by integrating essential tests, automated diagnostics and guided troubleshooting. Read on to learn more! 
(WHITE PAPER) READ ABSTRACT |

Mirapoint RazorSafe™ by Mirapoint Software, Inc.

September 2009 - (Free Research)
RazorSafe operates in a low-risk, passive mode and archives all emails, while ensuring minimal impact on your email infrastructure. RazorSafe uses open, standard protocols (POP, IMAP, SMTP) to archive all emails sent or received from the email server. 
(DATA SHEET) READ ABSTRACT |

802.1x - Implementing and Deploying Methods by Global Knowledge

July 2013 - (Free Research)
You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have. 
(WHITE PAPER) READ ABSTRACT |

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit by Attachmate Corporation

March 2012 - (Free Research)
This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Building Your Business Case for Managed File Transfer by OpenText

November 2011 - (Free Research)
The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing. 
(WHITE PAPER) READ ABSTRACT |

The Ten Layers of Security in BIRT iHub by Actuate

June 2014 - (Free Research)
The following white paper explores the 10 layers of security in the BIRT iHub. Learn how to manage each layer successfully, how to enable central configuration, and more. 
(WHITE PAPER) READ ABSTRACT |

Cost-Effective Document Management Solutions for Business-Critical Processes - Part I: Why a New Generation of Enterprise Content Management Solutions Are Emerging to Meet the Need for Secure Document Exchange by IntraLinks, Inc

March 2009 - (Free Research)
This is Part I of a white paper series that examines online workspaces, a type of enterprise content management solution delivered in a Software-as-a-Service model. This paper provides an overview of online workspaces as an alternative to current document management methods. 
(WHITE PAPER) READ ABSTRACT |

How to create inherently secure communications by ComputerWeekly.com

November 2010 - (Free Research)
In earlier times, if an enterprise presumed it had control over its network, and if it had few external connections or communication, it was feasible that the connections between operational computers probably were not an unacceptable risk. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts