Compliance (Law) White Papers

(View All Report Types)
The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM

Records Management’s Breaking Point: Managing Electronic Records in High-Volume Environments
sponsored by ASG Software Solutions
WHITE PAPER: This White paper outlines issues that make manging transactional electronic records challenging, demonstrates why organizations need to tame the high volume transactional records beast, and lastly, describes what to look for in a transactional electronic records management solution.
Posted: 15 Apr 2011 | Published: 15 Apr 2011

ASG Software Solutions

When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure
sponsored by Trend Micro, Inc.
WHITE PAPER: Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Virtualization Security: Achieving Compliance for the Virtual Infrastructure
sponsored by Trend Micro
WHITE PAPER: What’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. Read this paper to learn about top trends in virtualization security, how virtualization poses unique challenges to compliance, and more!
Posted: 17 Mar 2010 | Published: 01 Dec 2009

Trend Micro

The Top 10 Reasons to Automate Your AP Processes
sponsored by Kofax, Inc.
WHITE PAPER: This white paper examines in detail the relevant issues and benefits of Accounts Payable (AP) transformation as well as recent industry-wide research and best practices around such initiatives.
Posted: 23 Sep 2010 | Published: 23 Sep 2010

Kofax, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Demand More From Your Data Center Environment
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a colocation strategy that offers more than just space and power to help you optimize your data center operations, achieve compliant IT security, and more.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 15 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM