IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

 8 Phases of a Successful Consolidation Initiative

This white paper provides an overview of the factors driving server and data center consolidation and considers best practices for ensuring a successful consolidation initiative and a maximum return on investment.
Read more...
 

 Consolidated Disaster Recovery Using Virtualization

Traditional disaster recovery infrastructures have failed to keep pace with business requirements for recovery speed and integrity at a reasonable cost.

Read more...
 

 Improving IT Execution

This ExecBlueprint discusses ways that IT can step into this new role and, in the process, improve its ability to execute technology solutions that will most optimally drive business growth and productivity.

Read more...
 

 Maximizing IT's Impact through IT/Business Alignment

This ExecBlueprint shares how four IT leaders have achieved alignment with their respective organizations and contributed substantially to their success and growth.
Read more...
 

 PDF security - a brief history of development

This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files.
Read more...
 

 Document Security - a guide to securing your documents

This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Read more...
 

eLearning security - the protection of elearning courses from intellectual property theft

NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Read more...
 

eLearning security - the protection of elearning courses from intellectual property theft

NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Read more...
 

 Document Security - the protection of confidential information from intellectual property theft

The Austin Diagnostic Clinic had to protect confidential information contained in their management documents so that it could be made available to physicians who could not make it to management meetings.

Read more...
 

Protect your document & intellectual property with Locklizard

In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Read more...
 

Encryption is not enough for DRM

This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection.  It covers key management, enforcing time limitations, and other methods of document control.

Read more...
 

Information Leakage - the enemy is within

This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.
Read more...
 

 Email As Part Of a Business Continuity Strategy

Email has become an integral part of business and it’s crucial to include it in business continuity planning.
Read more...
 
12 Steps to Ensuring Good Evidential Quality of Email
Litigants in the United States are required by law to give discovery of ‘electronically stored information’ (ESI). The obligations are found in the 2006 modification to the Federal Rules of Civil Procedure (FRCP).
Read more...
 
Page 19 of 22

  Most Popular | All