Compliance Management Software Reports

State of GDPR in mainland Europe
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 08 Feb 2021 | Published: 15 Nov 2019

TechTarget ComputerWeekly.com

Tivoli Endpoint Manager: Continuous Compliance in a Distributed World
sponsored by Mainline Information Systems
PRESENTATION TRANSCRIPT: This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues.
Posted: 17 Jun 2011 | Published: 16 Jun 2011

Mainline Information Systems

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

Understanding E-Discovery Software Requirements
sponsored by Exterro
WHITE PAPER: This IT buyer's guide dives into eDiscovery software requirements by highlighting the capabilities commonly needed by IT teams and how a web-based legal process management software suite meets these requirements.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Exterro

Top 3 Cloud Security Developments
sponsored by TechTarget Security
EBOOK: This Insider Edition supplement to Information Security magazine covers three cloud safety issues in the enterprise: cloud containers; cloud compliance; and shadow cloud.
Posted: 09 Feb 2016 | Published: 29 Apr 2016

TechTarget Security

Facing up to emerging technology: Risks and benefits
sponsored by TechTarget CIO
EBOOK: Cutting-edge technologies offer companies competitive advantages but also present security threats. Learn how to mitigate emerging technology risks.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

TechTarget CIO

Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity