Glba Practice ArticlesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Glba Practice Articles returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Virtualization
 •   Storage Management
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Function Of Glba Practice
 •   Glba Find
 •   Glba Practice Articles Conferencing
 •   Glba Practice Articles Cycle
 •   Glba Practice Articles Designers
 •   Glba Practice Product
 •   Glba Practice Projects
 •   Latest Glba Practice Articles
 •   Open Glba
 •   Operating Glba Practice Articles
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 10, 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

Vulnerability Management for GLBA Compliance by Qualys, Inc.

May 2008 - (Free Research)
The QualysGuard vulnerability management and policy compliance solution helps financial institutions to meet many key security guidelines. 
(WHITE PAPER) READ ABSTRACT |

Ease GLBA Compliance with LogRhythm by LogRhythm, Inc.

October 2012 - (Free Research)
Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process. 
(WHITE PAPER) READ ABSTRACT |

Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility. 
(WHITE PAPER) READ ABSTRACT |

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements. 
(WEBCAST) READ ABSTRACT |

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements. 
(PODCAST) READ ABSTRACT |

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Article: Best practices for deploying iSCSI SANs in DSS database solutions by Dell, Inc.

April 2011 - (Free Research)
Scalability and availability are key factors of an effective DSS or DW solution. Adhering to the best practices outlined in this article for integrating Dell EqualLogic PS Series iSCSI SAN arrays into the design can help IT administrators create a scalable high-performance infrastructure. 
(ANALYST NEWS) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

Eagle Bank Keeps Deposits and Customer Data Safe by Imprivata

February 2010 - (Free Research)
This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management. 
(WHITE PAPER) READ ABSTRACT |

SUN SYSTEMS FOR ORACLE COHERENCE: An optimal in-memory data grid architecture by Sun Microsystems, Inc.

November 2009 - (Free Research)
Optimizing the benefits of a data grid built with Oracle Coherence relies upon creating a modular, balanced architecture. Matching the number of application servers, memory capacity, and quantity of processing nodes to the target workload characteristics is important to achieving the best performance. 
(WHITE PAPER) READ ABSTRACT |

Article: Design Patterns for Case Management by EMC Corporation

August 2011 - (Free Research)
This article discusses how using a ‘case management’ construct as an organizing principle can often simplify the challenges associated with complex decision-intensive processes. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Best practices in virtualisation by ComputerWeekly.com

March 2012 - (Free Research)
Philip Dawson, Gartner VP offers best practice advice for organisations looking to virtualise their IT infrastructure. 
(ANALYST BRIEF) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Safe, Realistic Test Data: The Case for RowGen by Innovative Routines International, Inc.

March 2008 - (Free Research)
RowGen provides a cost-effective alternative to the practice of production data replication. This is accomplished by providing data content that requires no additional security measures. 
(WHITE PAPER) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Article: How end-to-end services can transform Oracle environments by Dell, Inc.

April 2011 - (Free Research)
The creation of the Dell Services Oracle Practice builds on the long and successful relationship between Dell and Oracle - a collaboration that can offer significant benefits to organizations running Oracle software on Dell hardware. Read this article for more. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Best practices for I&O for cloud-readiness by ComputerWeekly.com

January 2013 - (Free Research)
Gartner analysts explain how Infrastructure and Operations (I&O) teams can best prepare for the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Leverage Security Intelligence For Financial Services Institutions by IBM

March 2013 - (Free Research)
In this resource, discover how financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates. 
(WHITE PAPER) READ ABSTRACT |

Five Best Practices for Unified Communications by AT&T Corp

October 2009 - (Free Research)
Enterprises can realize value from their UC programs by following some basic practices, such as allowing for sufficient up-front planning, finding the right champion, and establishing cross-functional teams to manage program implementation. This article provides basic guidelines for implementing a successful UC program. Read on to learn more. 
(WHITE PAPER)

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Seven Best Practices of Highly Effective eDiscovery Practitioners: Powerful Lessons in eDiscovery Success by Guidance Software, Inc.

April 2010 - (Free Research)
The Seven Best Practices of Highly Effective eDiscovery Practitioners article provides legal professionals with insight on how they and other members of the eDiscovery team can achieve a repeatable, defensible in-house eDiscovery process. Read this paper to learn so much more. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Migrating to a New Service Desk Platform by Nimsoft, Inc.

July 2012 - (Free Research)
This white paper offers guidelines and best practices for IT organizations that are in the midst of, or are planning a migration to a new service desk platform. Within, learn how you can effortlessly migrate your tickets, workflow, knowledge articles, and more. 
(WHITE PAPER) READ ABSTRACT |

Regulations Shift Focus on Outbound Email Security by Proofpoint, Inc.

July 2008 - (Free Research)
Outbound email and other electronic communications pose a significant risk for data loss or leakage. This white paper will examine the new email security and compliance challenges and ways to address them. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts