Security Compliance Through ManualsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Compliance Through Manuals returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Managed Security Services
 •   Application Security
 •   Business Process Management (BPM)

Related Searches
 •   Developments Security Compliance Through
 •   Display Security Compliance Through
 •   Document Security Compliance
 •   Free Security
 •   Integration Security Compliance Through
 •   Multi Security
 •   Practices Security
 •   Security Compliance Through Commercial
 •   Security Compliance Through Quality
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations by ArcSight, an HP Company

March 02, 2010 - (Free Research)
This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out. 
(WHITE PAPER) READ ABSTRACT |

Control Compliance Suite Trialware by Symantec Corporation

April 01, 2009 - (Free Research)
Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial. 
(DOWNLOAD)

Cisco IT GRC Security Assessment Service by Cisco Systems, Inc.

June 12, 2009 - (Free Research)
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

November 22, 2010 - (Free Research)
This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk. 
(WHITE PAPER) READ ABSTRACT |

Third Party Tools: Strengthening Security, Compliance and Control of Microsoft® Office 365® by Mimecast

February 20, 2014 - (Free Research)
Office 365 represents Microsoft's latest venture into the Cloud services space. But despite the range of functionality offered in Office 365, it cannot be all things to all customers. This white paper discusses why some customers should consider the use of third-party tools to enhance Office 365's native capabilities. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

August 2009 - (Free Research)
Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network. 
(WHITE PAPER) READ ABSTRACT |

Center for Charter Schools at Central Michigan University Uses DocAve to Migrate Mission-Critical SharePoint Data by AvePoint, Inc.

February 2010 - (Free Research)
The Center for Charters at CMU needed a unified platform upon which to collaborate effectively, store digital assets efficiently, and maintain industry compliant audit histories. Read this case study to learn how they used DocAve SharePoint Migrator for a hassle-free migration into MOSS with no metadata loss. 
(CASE STUDY) READ ABSTRACT |

Effective Security with a Continuous Approach to ISO 27001 Compliance by Tripwire, Inc.

July 2008 - (Free Research)
In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. 
(WHITE PAPER) READ ABSTRACT |

Ensure Data Protection with Sun StorageTek T10000B Tape Drives by Sun StorageTek

October 2008 - (Free Research)
Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements. 
(VIDEOCAST) READ ABSTRACT |

E-guide: WAN optimization improvesthroughput for medical images by Belden

November 2011 - (Free Research)
In this day and age, hospitals are growing increasingly more dependent on wide area networks (WAN) to adequately share information without increasing costs though additional bandwidth or data circuits.  In this e-guide you will learn how one organization successfully implemented a WAN and how it can work for your organization too. 
(EGUIDE) READ ABSTRACT |

Choosing a Cloud Hosting Provider with Confidence by Symantec Corporation

May 2012 - (Free Research)
This paper uncovers tips for choosing a cloud hosting provider and explores where and when to use cloud solutions, specific issues enterprises should raise with hosting providers before selecting a vendor, and ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence. 
(WHITE PAPER) READ ABSTRACT |

Analyst Report: Case Management Automation - Facilitating Compliance by EMC Corporation

September 2010 - (Free Research)
Read this white paper to learn about the compliance implications of case-based process automaiton. 
(WHITE PAPER) READ ABSTRACT |

Access Certification: Addressing and Building on a Critical Security Control by Oracle Corporation

January 2010 - (Free Research)
This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers. 
(WHITE PAPER) READ ABSTRACT |

BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving by IBM

May 2013 - (Free Research)
This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Making the FACTA Red Flags Rules Operational by RSA, The Security Division of EMC

October 2008 - (Free Research)
Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program. 
(WHITE PAPER) READ ABSTRACT |

Forrester Study: The Total Economic Impact of Oracle Identity Analytics by Oracle Corporation

December 2010 - (Free Research)
Based on real customers' data, this comprehensive study walks through detailed return-on-investment (ROI) calculations for compliance and streamlined access, and guides you in computing cost savings with identity & access governance solution. 
(ANALYST REPORT) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Security Intelligence for Energy and Utilities Companies by IBM

July 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

The Alcatel-Lucent OmniAccess 8550 WebServices Gateway: AUTOMATED WORKFLOW FOR IMPROVED PAT IENT CARE by Alcatel-Lucent

April 2008 - (Free Research)
The Alcatel-Lucent OmniAccess 8550 Web Services Gateway is a network appliance that secures automated business processes to meet corporate governance obligations. 
(WEBCAST) READ ABSTRACT |

Product Preview: Time Tracking by Workday

August 2013 - (Free Research)
In this fascinating video, learn about a time tracking solution that can reduce labor costs, minimize compliance risks, and increase worker productivity. 
(WEBCAST) READ ABSTRACT |

Turning the Compliance Challenge into a Business Advantage by SAP America, Inc.

September 2008 - (Free Research)
New rules have spawned an army of consultants, vendors and solutions to address the "compliance" problem. Read this paper to learn how to turn the compliance challenge into a business advantage. 
(WHITE PAPER) READ ABSTRACT |

IT Priorities - Automated Deployment by Interwoven, Inc.

September 2006 - (Free Research)
For IT groups, the ability to bring revenue generating applications to market faster is a top priority. Learn how automated deployment of your enterprise applications can ensure accuracy, establish compliance controls and reduce provisioning costs. 
(WEBCAST) READ ABSTRACT |

Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management by Novell, Inc.

May 2011 - (Free Research)
Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program. 
(WHITE PAPER) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle by Guardium, an IBM Company

February 2010 - (Free Research)
Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle. 
(DATA SHEET) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts