Compliance Auditing Reports

Data protection rises up business agenda
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 08 Feb 2021 | Published: 17 Dec 2018

TechTarget ComputerWeekly.com

An Expert Guide to the PCI DSS 3.0
sponsored by TechTarget Security
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

TechTarget Security

Eguide: Top 10 risks in cloud computing and how to stay compliant
sponsored by TechTarget Security
EGUIDE: Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

TechTarget Security

How to Comply with the HIPAA Security Rule
sponsored by Thawte Inc.
EGUIDE: In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Thawte Inc.

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Transferring Data without Secure Protocols?
sponsored by Globalscape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

Globalscape

InfoSphere Optim Data Redaction
sponsored by IBM
WHITE PAPER: As data continues to expand and organizations find new ways to collaborate with partners and customers, the question arises: How secure is your sensitive information?  In addition, organizations must also ensure that the right information stays private. Learn how organizations are striving to support information governance programs.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Cloud Compliance Technical Guide
sponsored by TechTarget Security
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

TechTarget Security