Security Compliance CapacitiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Compliance Capacities returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Policies
 •   Network Security
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   E-Mail Management
 •   Endpoint Security
 •   Identity Management/ User Provisioning

Related Searches
 •   Demos Security Compliance Capacities
 •   Security Backups
 •   Security Compliance Capacities Cycle
 •   Security Compliance Capacities Repairs
 •   Security Compliance Colorado
 •   Security Databases
 •   Study Security
 •   Supplier Security Compliance
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Why Cloud-Based Security and Archiving Make Sense by Google Postini

June 03, 2010 - (Free Research)
Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both. 
(WEBCAST) READ ABSTRACT |

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager by Novell, Inc.

December 08, 2009 - (Free Research)
Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 30, 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Avoiding 7 Common Mistakes of IT Security Compliance by Qualys, Inc.

April 01, 2009 - (Free Research)
This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals. 
(EGUIDE) READ ABSTRACT |

e-Zine: Purchasing Considerations for Exchange 2010 by Dell and Microsoft

April 18, 2012 - (Free Research)
Find out why now is the best time to migrate to Exchange 2010 in this expert e-zine. Plus, discover how to cost-effectively meet the hardware and performance demands of this latest upgrade. 
(EZINE)

Endpoint Security Compliance: Top 19 Questions Auditors Ask by Lumension

April 11, 2014 - (Free Research)
This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time. 
(WEBCAST) READ ABSTRACT |

Support PCI Security Compliance with Enhanced Solutions from IBM by IBM

February 13, 2009 - (Free Research)
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance. 
(WHITE PAPER) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 06, 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Comparing health care data security compliance to other industries by Hewlett-Packard Company

April 09, 2012 - (Free Research)
<p>This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.</p> 
(EGUIDE) READ ABSTRACT |

Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions by Lumension

October 19, 2009 - (Free Research)
Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule. 
(WHITE PAPER) READ ABSTRACT |

2010 Information Security & Compliance Trend Study by nCircle

August 02, 2010 - (Free Research)
This report summarizes the results of the nCircle 2010 Information Security and Compliance Trend Study, a cross-industry survey of over 250 respondents in the IT security industry in the United States and Canada. Over 65% of survey respondents are from large and midsize enterprises. 
(WHITE PAPER) READ ABSTRACT |

PowerBroker Password Safe: Security, Compliance, Productivity by BeyondTrust Corporation

April 29, 2013 - (Free Research)
Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business. 
(TRIAL SOFTWARE) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

Data Protection 2.0: It’s Not Just Names and Numbers Anymore by Tripwire, Inc.

February 2011 - (Free Research)
The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protec­tion requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges. 
(WHITE PAPER) READ ABSTRACT |

Web Application Firewalls: Patching, SDLC Key for Security, Compliance by Symantec Corporation

February 2013 - (Free Research)
In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now. 
(EGUIDE) READ ABSTRACT |

CA Mainframe Security Compliance by IBM

June 2008 - (Free Research)
In this video, learn how to combat against regulatory, staffing and audit pressures that security management shortcomings bring to the table. 
(VIDEOCAST) READ ABSTRACT |

Protecting SharePoint Data Long Term by Varonis

July 2009 - (Free Research)
This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help. 
(WHITE PAPER) READ ABSTRACT |

EMC SourceOne for Microsoft Exchange 2010 by EMC Corporation

October 2010 - (Free Research)
This Data Sheet describes the new capabilities Microsoft and EMC provide for managing Microsoft Exchange 2010 e-mail, while meeting security, compliance, and eDiscovery requirements. The paper is jointly written with Microsoft. 
(DATA SHEET) READ ABSTRACT |

Third Party Tools: Strengthening Security, Compliance and Control of Microsoft® Office 365® by Mimecast

February 2014 - (Free Research)
This whitepaper covers why Microsoft Office 365 has shortcomings and offers third party tools as a solution for fixing some of the limitations. 
(WHITE PAPER) READ ABSTRACT |

How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com

October 2009 - (Free Research)
This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more. 
(PRESENTATION) READ ABSTRACT |

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by Tripwire, Inc.

May 2010 - (Free Research)
This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

IT Policy Compliance for Dummies® by Qualys

April 2010 - (Free Research)
This book simply explains IT policy compliance and the steps your organisation needs to carry out to prove compliance to an independent auditor. After reading this book you'll know how to create compliance policies and prepare your IT operations to fulfill those requirements. 
(EBOOK) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

November 2010 - (Free Research)
This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk. 
(WHITE PAPER) READ ABSTRACT |

Laws, regulations and compliance: Top tips for keeping your data under your control by Sophos, Inc.

December 2008 - (Free Research)
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution. 
(WHITE PAPER) READ ABSTRACT |

ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity by ArcSight, an HP Company

June 2010 - (Free Research)
This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts