Computing ComplianceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computing Compliance returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Policies
 •   Virtualization
 •   Application Security
 •   Network Security
 •   Grid/ Utility Computing
 •   Managed Security Services
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring

Related Searches
 •   Computing Compliance Papers
 •   Computing Compliance Security
 •   Computing Compliance Standards
 •   Computing Starting
 •   Functions Of Computing Compliance
 •   Internet-Based Computing Compliance
 •   Licenses Computing Compliance
 •   Rfq Computing Compliance
 •   Tool Computing Compliance
 •   Top Computing Compliance
Advertisement

ALL RESULTS
1 - 25 of 454 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Essential Guide to PCI DSS by Information Security Magazine

September 14, 2009 - (Free Research)
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more. 
(EGUIDE) READ ABSTRACT |

IT Decision Checklist: Messaging Security by SearchSecurity.com

March 03, 2010 - (Free Research)
Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Securing Access to Resources in the Cloud:  What's Really Possible Today by FoxT

May 19, 2010 - (Free Research)
This presentation transcript explores the cloud from both a business and technical perspective to show how organizations can benefit from cloud services while maintaining the control and auditing capabilities to remain secure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Compliance and Cloud Security eBook by SearchSecurity.com

July 19, 2011 - (Free Research)
SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing. 
(EBOOK) READ ABSTRACT |

Ecomanage Network Corporation Develops a Service Offering for Manufacturers to Fully Manage Wastes and Meet Disposal Regulations by IBM

October 26, 2009 - (Free Research)
Read this case study to see how IBM Global Services implemented and is operating the Wastes and Resources Circulation Management System, a hybrid solution of private and public cloud computing. 
(CASE STUDY) READ ABSTRACT |

Expert outlook on cloud GRC by SearchCompliance.com

April 23, 2014 - (Free Research)
Cloud computing risk management, governance and compliance processes are evolving as organizations increasing turn to hosted services. Learn how in our SearchCompliance handbook. 
(EBOOK) READ ABSTRACT |

Core HR Kit: Cut costs, engage your people, and ensure compliance by SuccessFactors

March 04, 2014 - (Free Research)
This resource offers insight to help you choose an effective core HR system. Read on to discover key benefits of the right tool and learn how you can get started today. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email and Data Loss Prevention in Today’s Enterprise, 2010 by Proofpoint, Inc.

September 08, 2010 - (Free Research)
This report summarizes the findings of Proofpoint’s seventh annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to help raise awareness of the policy, technology and cultural issues surrounding email and Web monitoring, data protection and information leaks. 
(WHITE PAPER) READ ABSTRACT |

Cloud-based archiving for e-discovery/compliance: Five "need to knows" by Hewlett-Packard Company

May 01, 2013 - (Free Research)
This expert E-Guide discusses five key questions to answer when evaluating or developing a cloud-based archiving strategy for your business. 
(EGUIDE) READ ABSTRACT |

Agentless Power Management: Enforcing Green IT Compliance by Promisec

May 23, 2014 - (Free Research)
This white paper sheds light on how green IT compliance shouldn't be overlooked not only for the sake of the environment and government initiatives, but for your tight budgets. Click to learn how power management can cut energy costs and reduce your carbon footprint. 
(WHITE PAPER) READ ABSTRACT |

February Technical Guide on Cloud Compliance by SearchSecurity.com

February 24, 2012 - (Free Research)
In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more. 
(EGUIDE) READ ABSTRACT |

CW+ Gartner Research: The impact of cloud computing on suppliers in banking by ComputerWeekly.com

July 05, 2010 - (Free Research)
Despite well-publicised concerns regarding security, compliance and data integration issues, banking institutions have begun embracing cloud computing across the services spectrum. 
(WHITE PAPER) READ ABSTRACT |

July Essentials Guide on Cloud Computing by SearchSecurity.com

July 09, 2012 - (Free Research)
This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more. 
(EBOOK) READ ABSTRACT |

Eguide: Top 10 risks in cloud computing and how to stay compliant by SearchSecurity.com

October 03, 2011 - (Free Research)
Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing. 
(EGUIDE) READ ABSTRACT |

How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com

October 28, 2009 - (Free Research)
This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more. 
(PRESENTATION) READ ABSTRACT |

IBM POV: Security & Cloud Computing by IBM

November 02, 2009 - (Free Research)
Read this paper from IBM to see how cloud computing may present an added level of risk because essential services are often outsourced to a third party. Discover how the IBM Security Framework can help you address these key security challenges. 
(WHITE PAPER) READ ABSTRACT |

Securing Privilege Delegation in Public and Private Cloud Computing Infrastructure by BeyondTrust Corporation

June 10, 2010 - (Free Research)
As an emerging trend that provides rapid access to dynamically scalable and virtualized IT resources, cloud computing promises new and exciting opportunities for organizations to create lean, robust and cost-effective IT infrastructures that better align with business goals. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

HOW TO USE PCI SSC SUPPLEMENT TO ACHIEVE PCI COMPLIANCE IN THE CLOUD by SearchSecurity.com

September 19, 2013 - (Free Research)
This expert guide from SearchSecurity.com examines highlights of the PCI SSC's guidelines to help your business achieve PCI compliance in the cloud. Read on to learn how you can easily secure your applications and your customers' trust. 
(EGUIDE) READ ABSTRACT |

Securing and Mitigating Risk in the Cloud by SearchSecurity.com

July 18, 2013 - (Free Research)
Cloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition. 
(EGUIDE) READ ABSTRACT |

Overcoming the Three Biggest PCI Challenges by Alert Logic

August 19, 2009 - (Free Research)
PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Compliance in the Cloud: Myth or Reality by SunGard Availability Services

February 24, 2014 - (Free Research)
This expert resource covers a series of frequently asked questions about cloud providers and how they handle data protection and compliance. 
(WHITE PAPER) READ ABSTRACT |

Maintaining Control & Compliance in the Cloud with Data-Centric Security by SafeNet, Inc.

March 03, 2010 - (Free Research)
With promises of flexibility, ease of use, and lower costs, Service Oriented Architectures (SOA) and Virtualization are leading IT to the new outsourced computing model known as Cloud. This session will provide details on the impact of Cloud on information security and the data-centric solutions for specific use-cases. 
(WEBCAST) READ ABSTRACT |

Compliance and Mobile Computing by Intermec

March 2008 - (Free Research)
The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment. 
(WHITE PAPER) READ ABSTRACT |

RSA Solution for Cloud Security and Compliance by RSA, The Security Division of EMC

December 2010 - (Free Research)
This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence. 
(WEBCAST) READ ABSTRACT |

Maintaining Continuous Compliance – a new best practice approach by IBM

July 2011 - (Free Research)
When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 454 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts