Compliance White Papers

Results 1 - 25 of 498Sort Results By: Published Date | Title | Company Name
By: OpenText     Published Date: Feb 06, 2018

Read the white paper to learn how you can address key GDPR requirements by consolidating all your data in a central repository to gain tighter security and control, easier access and retrieval.

Tags : opentext, gdpr compliance, eu privacy, data protection, data access, compliance, network security, remote access, access control, policy based management, security policies, best practices, international computing, business technology, data loss prevention
    
By: OpenText     Published Date: Jan 31, 2018

Read this white paper to learn how to minimize, consolidate, and protect your data and how data identification and analytics play a key role in overcoming GDPR compliance concerns.

Tags : opentext, gdpr, gdpr compliance, data protection, data identification, network security, compliance, identity management, web service security, wireless security, customer service, ebusiness, mobile device management
    
By: OpenText     Published Date: Jan 26, 2018

Read this AIIM white paper to learn how to tackle future information privacy and security concerns of new and future technologies such as IoT and machine learning, and prepare for the GDPR.

Tags : opentext, compliance, gdpr, gdpr compliance, information privacy, data protection, privacy, identity management, policy based management, security policies, pci compliance, business technology
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, website development, networking, it management, knowledge management
    
By: Mimecast     Published Date: Apr 16, 2009

According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.

Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, backup and recovery, storage management, email security, security management, document management, records management, search and retrieval, email archiving
    
By: Mimecast     Published Date: Mar 31, 2009

The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.

Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc, tco, architecture, secure, storage management, application security, compliance, security management, security policies, web service security, ebusiness, email archiving
    
By: 123Together     Published Date: Feb 05, 2009

Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity

Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, configuration management, collaborative commerce
    
By: Mimecast     Published Date: Sep 30, 2008

Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.

Tags : mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance, backup and recovery, storage area networks, security management, information management, email archiving
    
By: Mimecast     Published Date: Sep 25, 2008

Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.

Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, application security, email security, security management, mobile workers, business process automation, business process management, collaboration, collaborative commerce, messaging
    
By: Globality     Published Date: Apr 05, 2018

Frustration with high legal fees and demand for local regulatory knowledge may give boutique law firms an edge with larger clients.

Tags : globality, legal, compliance, regulations, local regulations, security management, security policies, best practices, business management, information management, financial management, business technology, market research
    
By: iboss     Published Date: Jan 22, 2018

When the General Data Protection Regulation (GDPR) replaces the European Unionís Data Protection Directive 95/46/ec on May 25, 2018, businesses across the globe will be subject to a wealth of potential fees and penalties for non-compliance.

Tags : iboss, gdpr, gdpr compliance, compliance, general data protection regulation, remote access, security policies, web service security, data protection, business technology
    
By: RSA     Published Date: Sep 19, 2017

The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.

Tags : gdpr, data protection, rsa, rsa security, personal data, privacy, compliance, security policies, data loss prevention
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security, data loss prevention
    
By: RSA     Published Date: Sep 19, 2017

This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably havenít considered.

Tags : rsa, rsa security, gdpr, data protection, compliance, network security, internet security, intrusion detection, best practices, business technology, data loss prevention
    
By: RSA     Published Date: Sep 19, 2017

Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.

Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security, security policies, web service security, best practices, data replication, database security, business technology, data loss prevention
    
By: GE Power     Published Date: Mar 01, 2017

Coal power producers worldwide are facing challenges in today's dynamic energy markets. The need to cycle quickly due to renewables on the grid, emissions compliance and the need to operate efficiently are all factors that drive a sustainable coal power business. Find out how the global coal power community can turn to software to help create cleaner and more efficiently produced power.

Tags : coal power plants, coal power, steam power plants, utilities, power producers, power grids, power industry, power plant software, powerplants, compliance, business integration, quality assurance, software compliance
    
By: Entrust Datacard     Published Date: Sep 28, 2016

This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.

Tags : security, security application, ssl, ssl certificates, sha, application security, compliance, intrusion detection, intrusion prevention, security management, security policies
    
By: Oracle     Published Date: Sep 06, 2016

Manufacturing faces many challenges in the 21st century with an explosion of new technologies, increasing regulations and ever-rising customer expectations. Itís time to re-imagine manufacturing.

Tags : oracle scm cloud, cloud computing, cloud, scm, security, security application, application security, compliance, internet security, security management, infrastructure
    
By: Oracle     Published Date: Sep 06, 2016

Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.

Tags : supply chain, cloud computing, cloud, supply chain management, compliance, oracle, application security, security management, virtualization
    
By: Oracle     Published Date: Sep 06, 2016

Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.

Tags : supply chain, cloud computing, cloud, supply chain management, compliance, oracle, application security, security management, infrastructure
    
By: Oracle     Published Date: Sep 06, 2016

Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.

Tags : supply chain, cloud computing, cloud, supply chain management, compliance, oracle, application security, security management, virtualization
    
By: NAVEX Global     Published Date: Aug 18, 2016

In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.

Tags : compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas, security management, risk management
    
By: Logrhythm     Published Date: Feb 24, 2016

The time has come for CEOs and Boards to take personal responsibility for improving their companiesí cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.

Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control, anti spam, anti spyware, anti virus, application security, authentication, compliance, identity management, intrusion detection, intrusion prevention
    
By: Logrhythm     Published Date: Feb 24, 2016

In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.

Tags : logrhythm, cyber attacks, cyber threat, security, security application, application security, compliance, hacker detection, intrusion detection, intrusion prevention, security management, security policies
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.