IT Compliance Reports

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software

Understanding Data Privacy and CCPA
sponsored by Micro Focus
EGUIDE: In this e-guide, get a better understanding of data privacy through two expert articles about the intersection of marketing and data privacy as well as everything you need to know about the California Consumer Privacy Act.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Micro Focus

Unified Threat Management: From Business Problem to Technical Solution
sponsored by TechTarget Security
EBOOK: Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

TechTarget Security

Data Center Designs to Help Meet Your Compliance Challenge
sponsored by Iron Mountain
WHITE PAPER: This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
sponsored by IBM
WHITE PAPER: This white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
Posted: 12 May 2014 | Published: 31 Jan 2014

IBM

Take Control of Your PST Problem
sponsored by Dell Software
WHITE PAPER: Find out best practices for migrating PST file data to a more secure Exchange or Office 365 environment, and get suggestions for tools that can help ensure your migration is successful. Read the White Paper >>
Posted: 06 May 2014 | Published: 07 May 2013

Dell Software

HIPAA Compliance in a BYOD Environment
sponsored by Imprivata
EGUIDE: Access this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Five Reasons Why Hiring A Third-Party Specialist Makes Sense When Securely Disposing Your IT Assets
sponsored by Iron Mountain
WHITE PAPER: Access this white paper to unveil the top 5 reasons why organizations should outsource IT asset disposal tasks. Learn how doing so can reduce costs and error, and ensure that economic, legal, and operations mandates are met.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Iron Mountain

The SOX Effect
sponsored by TechTarget Security
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

TechTarget Security

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation