Data Compliance ArticlesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Compliance Articles returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Application Security
 •   Security Monitoring
 •   Encryption and Key Management
 •   Storage Security

Related Searches
 •   Data Compliance Articles Own
 •   Data Compliance Articles Planning
 •   Data Compliance Articles Procurement
 •   Data Compliance Articles Vendors
 •   Data Compliance Enterprise
 •   Data Compliance Web Casts
 •   Do Data
 •   Maintenance Data Compliance Articles
 •   Monitor Data
 •   Reservation Data
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Deduplication: Effectively Reducing the Cost of Backup and Storage by AppAssure Software, Inc.

August 18, 2009 - (Free Research)
Organizations have to backup and store data. Compliance requirements demand that data be stored for periods of time. Reducing the cost of backup and storage starts with reducing the amount of data that is backed up and stored. Learn how deduplication, along with server-based backup processes can reduce your storage management costs. 
(WHITE PAPER) READ ABSTRACT |

Achieving Security With Cloud PC Backup by Iron Mountain

September 14, 2010 - (Free Research)
This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data. 
(WHITE PAPER) READ ABSTRACT |

Protecting Your Information as if It Were Our Own by Iron Mountain

August 24, 2012 - (Free Research)
This resource introduces the security practices and information security services of an information management services provider intent on providing unparalleled protection of assets, comprehensive security assurance and industry-leading expertise. Read on to discover a potential information management partner now. 
(WHITE PAPER) READ ABSTRACT |

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention by Trend Micro, Inc.

July 15, 2010 - (Free Research)
When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it. 
(CASE STUDY) READ ABSTRACT |

All Qualified Security Assessors Are Not Created Equal by AT&T Corp

August 04, 2010 - (Free Research)
The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment 
(WHITE PAPER)

5 Mistakes Auditing Virtual Environments (You Don't Want to Make) by HyTrust

July 21, 2011 - (Free Research)
Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 01, 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 09, 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine

June 16, 2010 - (Free Research)
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue. 
(EZINE)

Negotiating cloud contracts by ComputerWeekly.com

January 24, 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 23, 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Information Security Magazine - February 2010: Under Control by Information Security Magazine

February 03, 2010 - (Free Research)
Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more. 
(EZINE)

Mobility as a Service: Best Practices for Managing Mobile Work by Fiberlink Communications

March 2008 - (Free Research)
Fiberlink Communications studied the challenges of mobile computing as well as the best practices for the management, control and operations of a mobile platform. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs by Information Security Magazine

June 2009 - (Free Research)
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more. 
(EZINE)

The Business Impact of Data Security Regulations: Featuring Massachusetts by Sophos, Inc.

November 2009 - (Free Research)
Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance. 
(WHITE PAPER) READ ABSTRACT |

Getting Ready for Microsoft Windows Server 2008 by Dell, Inc.

April 2008 - (Free Research)
Read this article to learn about the many capabilities and benefits of Microsoft Windows Server 2008 and how Dell products can help simplify the migration to this new operating system. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Journal of Management Excellence: Building Trust by Oracle Corporation

July 2009 - (Free Research)
It is crucial for businesses to build trust with their customers, partners, investors, and with society at large. This journal article discusses building trust through modern performance management techniques, sustainability initiatives, managing reputation risk, end-to-end approaches to financial reporting and compliance, and more. 
(JOURNAL ARTICLE) READ ABSTRACT |

Survive the Scrutiny of Litigation:Rediscover Records Management by Iron Mountain

August 2012 - (Free Research)
Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management. 
(EBOOK) READ ABSTRACT |

Essential Guide to PCI DSS by Information Security Magazine

September 2009 - (Free Research)
This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more. 
(EGUIDE) READ ABSTRACT |

The business impact of data security regulations: Featuring Massachusetts by Sophos, Inc.

June 2009 - (Free Research)
This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Information Governance & Compliance by RSD

October 2011 - (Free Research)
Access this exclusive newsletter on best practices and tips of information governance with articles from leaders in enterprise technology. 
(NEWSLETTER) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

Secure Offsite Data Storage: It Keeps You Running by Iron Mountain

October 2012 - (Free Research)
Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Records Management Strategies for Social Media Compliance by Iron Mountain

November 2012 - (Free Research)
According Smithsonian Magazine, by 2013 businesses will generate as much data every 10 minutes as was generated in the world through 2003 – most of which will be social media data. Does you have a solid plan in place to effectively manage these social records? Read on to learn 5 steps to devising a social media records management program. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts