IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

enterasyslogoDistributed Intrusion Prevention System

Traditional IPS and firewalls fall short of providing effective threat containment and can expose the enterprise to unacceptable levels of risk. As the majority of threats now originate from inside the organization rather than outside, security needs to be everywhere, rather than just at select perimeter locations.

Read more...
 

Striking a Balance between Governance, Risk and Compliance

A new study commissioned by SAP, the world's largest business software company, draws on a survey conducted by Healthcare IT News and Healthcare Finance News to share strategies that will improve governance, compliance and business performance across today's healthcare organization.

Read more...
 

Information Security & Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy

Read this white paper about a tactical guide enabling you to take action and achieve operational excellence.

Read more...
 

File Integrity Monitoring: Compliance and Security for Virtual and Physical Environments

Read this white paper to find out the first solution to effectively combine configuration assessment and file integrity monitoring, enabling automated and sustainable configuration control throughout virtual and physical infrastructures.

Read more...
 

www.ostermanresearch.comConvincing Decision Makers of the Critical Need for Archiving

This white paper discusses the various reasons to archive email and other electronic content. However, it goes beyond that to provide some concrete reasons and justification for deploying and maintaining an archiving system, most of which are based on the cost savings that archiving can provide - both direct cost savings and reduced costs arising from lowered risk.

Read more...
 

WireheadSound Bank Secures Information, Reassures Customers with Regular Vulnerability Assessments and Penetration Testing

Sound Bank, headquartered in Morehead City, North Carolina, has grown over years of operation from an upstart bank with twelve employees to a thriving community bank with $133 million in assets, business has expanded, the Bank has made it a policy to protect their valuable financial information by conducting regular vulnerability assessment and penetration testing.

Read more...
 

WireheadThe Eastern Band of the Cherokee Nation Protects Tribal and Government Information with Extensive Penetration Testing

The Eastern Band of the Cherokee Nation Protects Tribal and Governmental Information with Extensive The Eastern Band of the Cherokee Nation members, half of whom live on tribal land in North Carolina near the Great Smoky Mountains National Park.

Read more...
 

WireheadThorough Testing Secures Canal Insurance Company's Web Applications and Sensitive Information

Canal Insurance Company has insured commercial truckers for over 60 years. Headquartered in Greenville, South Carolina, the company provides a wide range of insurance products through a nationwide network of independent agents.

Read more...
 

IBMA smarter approach to archiving

Today, almost anything across an enterprise's systems can be made digitally aware and interconnected. And given the business challenges of a smaller, flatter and more complex world, rethinking what information we store and how our information infrastructures work is a must.

Read more...
 

Information Security & Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy

Read this white paper about a tactical guide enabling you to take action and achieve operational excellence.

Read more...
 

Reducing Downtime and Business Loss: Addressing Busines Risk with Effective Technology

IDC customer-based studies show that using appropriate technology in consistent ways helps small and medium-sized (SMB) organizations, even as they address changing requirements.

Read more...
 

Smarter State Government Processes in 2010 - Enabling Citizen-Centric Processes and more!

Smarter State Government Processes in 2010 - Enabling Citizen-Centric Processes, Transforming Service Delivery and Reducing Costs with IBM WebSphere ILOG Business Rule Management System (BRMS) Technology

Read more...
 

Cost Effective Security and Compliance with Oracle Database 11g Release 2

The increasingly sophisticated nature of information theft, and the continued emergence of new data privacy protection regulations worldwide, requires strong data security.

Read more...
 

Right from the Start: SOA Lifestyle Governance

Service-oriented architectures (SOAs) promise unlimited agility and organizational flexibility. However, achieving these benefits is entirely contingent upon the ability to effectively manage the SOA environment across the enterprise. This paper presents an overview of strategies and practices for governing the transformation to, and the evolution of, SOA.

Read more...
 
Page 7 of 23

  Most Popular | All