Compliance Web Web CastsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance Web Web Casts returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Management and Maintenance
 •   Web Content Management and Publishing
 •   Application Security
 •   Enterprise Content Management (ECM)
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Anti-Spam

Related Searches
 •   Compliance Asp
 •   Compliance Linux
 •   Compliance Strategies
 •   Compliance Web Alabama
 •   Compliance Web Web Address
 •   Compliance Web Web File
 •   Manual Compliance Web
 •   Patent Compliance Web Web
 •   Systems Compliance
 •   Unix Compliance
Advertisement

ALL RESULTS
1 - 25 of 490 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications by FaceTime Communications

September 21, 2010 - (Free Research)
This whitepaper sets out some of the key rules, guidelines and associated risks for FINRA member firms and suggests ways that organisations can use technology to protect themselves and their RRs. In addition, it looks at some of the other issues that enterprises may encounter when enabling the new internet. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Deliver Application Integration Projects in Days by Cast Iron Systems

February 23, 2009 - (Free Research)
This white paper details the Cast Iron Integration Solution, which dramatically simplifies application integration today. As a purpose-built solution designed exclusively for application integration, it eliminates complexity from an integration problem and enables companies to implement projects in days, rather than weeks or months. 
(WHITE PAPER) READ ABSTRACT |

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.

June 01, 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations. 
(WHITE PAPER) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 20, 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection by Sophos, Inc.

June 10, 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations. 
(WHITE PAPER) READ ABSTRACT |

Stories That Move Mountains: Improve your presentation skills by ComputerWeekly.com

November 09, 2012 - (Free Research)
Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals. 
(BOOK) READ ABSTRACT |

Presentation Transcript: State of the Threat by Websense, Inc.

July 29, 2009 - (Free Research)
The monetizing of economic crime in Web 2.0 makes Web security a top priority for security pros. Traditional defenses are obsolete, so read this presentation transcript, taken from the video cast of the same name, and learn best practices for creating a new approach to Web security. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Redbooks: Connect Cloud and On-premise Applications Using WebSphere Cast Iron Integration by IBM

November 25, 2013 - (Free Research)
Download the following e-book and gain expert advice on what you need to know about connecting to the cloud and using on-premise applications to help drive your enterprise forward. 
(EBOOK) READ ABSTRACT |

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall by Riverbed Technology, Inc.

January 12, 2012 - (Free Research)
PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6. 
(WHITE PAPER) READ ABSTRACT |

Everything You Need to Know About WebSphere Cast Iron by IBM

March 11, 2014 - (Free Research)
This webcast covers a cloud integration solution that will help maximize your cloud and also features a demonstration of the product. 
(WEBCAST) READ ABSTRACT |

WebSphere Cast Iron Express Demo by IBM

November 25, 2013 - (Free Research)
Access the following webcast to gain a firsthand look on how you can easily integrate your enterprise data in a matter of seconds with Salesforce.com. 
(WEBCAST) READ ABSTRACT |

Agility Meets Stability: Best Practices for Application Integration by IBM

December 28, 2011 - (Free Research)
In this white paper, Dan Moore, the senior vice president of professional services at IBM, Cast Iron reviews the current application environment in light of emerging trends, describes an ideal complete integration solution and discusses common sense best practices as well as pitfalls. 
(WHITE PAPER) READ ABSTRACT |

How Can You Avoid a Web Security Breach? It's All in the Preparation by SearchSecurity.com

November 14, 2013 - (Free Research)
In this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches. 
(EGUIDE) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

Re-make or Re-model? A Cloud Computing E-Book, Chapter 2 by IBM

September 21, 2010 - (Free Research)
The upsurge in cloud computing presents development teams with challenges that may require them to rethink  established ways of building applications. Read this e-book, which discusses languages for cloud computing, distributed caching, scaling horizontally, and changing data architectures midcloud, for further discussion of these issues. 
(EBOOK) READ ABSTRACT |

The truth about software quality - a global benchmarking study by ComputerWeekly.com

December 15, 2010 - (Free Research)
This is the first in an annual series of reports highlighting trends in the structural quality of business applications regarding characteristics such as robustness, performance, securit y, and changeability. 
(WHITE PAPER) READ ABSTRACT |

RTDiscover by FaceTime Communications

December 10, 2007 - (Free Research)
The Internet has changed. Email and Web browsing traffic entering enterprise networks is now dwarfed by greynets like IM, VoIP and P2P, opening channels for potential malware coming in, as well as the danger of sensitive information leaking out 
(PRODUCT DEMO) READ ABSTRACT |

A Project Manager's Survival Guide to Going Agile by Rally Software

August 2008 - (Free Research)
This paper focuses on re-defining the job of project manager to better fit the self-managed team environment, one of the core Agile principles. Special emphasis is placed on the shift to servant leadership, with its focus on facilitation and collaboration 
(WHITE PAPER) READ ABSTRACT |

WebSphere Cast Iron Cloud Integration Technical Overview by IBM

March 2012 - (Free Research)
This whitepaper covers a solution that will make the migration and integration of all functions into the cloud much simpler. 
(WHITE PAPER) READ ABSTRACT |

Realizing Maximum Benefits from SAP NetWeaver® XI/SAP NetWeaver® PI by SEEBURGER

October 2008 - (Free Research)
Read how with the introduction of SAP NetWeaver XI/SAP NetWeaver PI, SAP has brought internal (EAI) and external (B2B/EDI) integration and collaboration into its core functionality. 
(WHITE PAPER) READ ABSTRACT |

Financial Services Company Relies on Cisco Storage Area Network by Cisco Systems, Inc.

April 2008 - (Free Research)
Rapidly growing AQR Capital Management invested in a Cisco SAN to protect critical financial information and to ensure disaster recovery. 
(CASE STUDY) READ ABSTRACT |

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa by SearchCompliance.com

February 2010 - (Free Research)
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards. 
(EBOOK) READ ABSTRACT |

Dell Software Inventory & Usage Management by Dell, Inc. and Intel®

October 2009 - (Free Research)
The Dell Software Inventory & Usage Management service automates software and hardware asset discovery and reporting, monitors software usage and helps simplify software license compliance helping managers to control IT costs, reduce software license compliance risks, and make informed decisions regarding software purchasing... 
(DATA SHEET) READ ABSTRACT |

Data Security in the E-discovery Process by SearchCompliance.com

October 2011 - (Free Research)
In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more. 
(EBOOK)

1 - 25 of 490 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts