Sarbanes-Oxley (SOX) Section 404 Reports

CollabNet Success Story: Agile CMMI
sponsored by CollabNet
CASE STUDY: Facing pressure to deliver solutions quickly and meet rapidly changing priorities, investment banks are reluctant to change processes and adopt new tools. Learn how CollabNet enabled software development/change management process that would enable CMMI compliance while accommodating existing Agile development practices used by various teams.
Posted: 06 Jan 2010 | Published: 06 Jan 2010

CollabNet

How the Guardium Platform Helped Dell IT Simplify Enterprise Security
sponsored by Guardium, an IBM Company
WHITE PAPER: Safeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.
Posted: 10 Aug 2010 | Published: 10 Aug 2010

Guardium, an IBM Company

Two Sides of the Same Coin: The Convergence of Security and Compliance
sponsored by Imperva.
WHITE PAPER: Security and compliance issue will continue to dominate IT initiations as long as valuable on customer, employees, patients and business financials is exchanged and stored.
Posted: 08 Oct 2008 | Published: 08 Oct 2008

Imperva.

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
sponsored by BWise
EGUIDE: This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
Posted: 28 Oct 2010 | Published: 28 Oct 2010

BWise

FAQ Guide: Regulatory Compliance Issues Drive Some IT Shops to Data Archive Appliances
sponsored by IBM
EGUIDE: Check out this SearchStorage.com FAQ guide to learn about the latest developments and the evolution of data archiving technology, the key characteristics of different appliances and more.
Posted: 13 Sep 2011 | Published: 13 Sep 2011

IBM

Get the Facts on Information Availability: Essential Data Protection, Recovery and Resiliency for Banks
sponsored by Vision Solutions
WHITE PAPER: The power of an information availability solution lies in its ability to transform any nonproductive, non-profitable downtime into the optimum level of value-producing business uptime.
Posted: 09 May 2008 | Published: 01 Jan 2007

Vision Solutions

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by TechTarget Security
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

TechTarget Security

APTARE StorageConsole Backup Manager
sponsored by APTARE
DATA SHEET: This informative paper examines a backup and recovery software solution that can help you increase your backup and restore success, streamline compliance, improve backup performance and much more. Read on to learn more.
Posted: 25 Oct 2013 | Published: 30 Aug 2013

APTARE

Information Security Magazine - October 2009: Security 7 Awards
sponsored by Information Security Magazine
EZINE: The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.
Posted: 13 Oct 2009 | Published: 13 Oct 2009

Information Security Magazine