IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

PCI DSS Compliance in the UNIX/Linux Datacenter Environment

This whitepaper discusses how creating a secure access control infrastructure in heterogeneous Unix/Linux environments supports the Payment Card Industry Data Security Standard (PCI DSS).  Symark PowerBroker controls access to systems and cardholder data, and creates comprehensive logs and audit trails.  Various tables show PowerBroker’s functionality mapped to the PCI DSS requirements.
Read more...
 

End-to-End BPM IBM Mini Education Course

In order to meet the demands of a constantly changing environment, businesses need to proactively manage their existing business processes. Business Process Management (BPM) helps businesses define and implement their goals, and measure and manage company financial results against these goals. Learn the features and benefits of the IBM® BPM Suite in this mini-course.
Read more...
 

BPM and Process Automation Helps Maximize IT ROI. Hear How it Can Work for You

Ball State University was having unusually high IT failure rates during online student registration. Using BPM powered by the Smart SOA™ approach, they streamlined and automated the process and maximized their ROI. Their solution can be applied to your organization. Attend this on-demand web seminar to find out how, and receive a complimentary IBM® white paper on end-to-end BPM.
Read more...
 

When Encryption Is Not Enough

Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Read more...
 

Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets

Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won’t do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Read more...
 

Data Protection Solutions at Midsize Organizations

In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Read more...
 

Osterman Research: Why Your Organization Needs to Implement DLP

Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Read more...
 

Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach

The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Read more...
 

 The Essential Guide to Disaster Recovery in i5/OS (AS/400) and AIX Environments

This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution. Readers will be able to quickly match their specific optimum uptime objectives with the easiest and most cost-effective IT.
Read more...
 

 How to Solve Downtime Challenges to Patient Care, Operations & HIPAA Compliance

This white paper shows how information availability solutions ensure the availability and accessibility of data and applications, regardless of planned or unplanned interruptions. They transform costly unproductive downtime into value producing uptime and help IT managers solve the challenges of automated patient care and compliance.
Read more...
 

 The State of Resilience & Optimization on IBM Power Systems - Research  Findings

This report includes the input of over 2,000 companies running AIX and IBM i (i5/OS) environments regarding their data protection, recovery and optimization technologies and strategies. Learn how your peers are striking the balance between the often antagonistic priorities of optimum IT availability and performance, service level agreements, IT staffing and budgets.
Read more...
 

 Essential Data Protection, Recovery and Resiliency for Banks

This white paper explores how the power of an information availability solution can unlock the latent potential of your IT environment and deliver new value for your organization. It includes an 'Action Worksheet' to use in discussions with your IT executives.
Read more...
 

 Getting Consensus on Business Requirements: Tips and Traps

Before your company launches its next package selection, implementation or upgrade, make sure you don’t cripple the project from the start by failing to identify your requirements – the number one reason that projects spin out of control.
Read more...
 

Web Application Threats are Evolving. Are Your Security Efforts Keeping Pace?

Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve.
Read more...
 
Page 19 of 23

  Most Popular | All