IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

 Document Security - a guide to securing your documents

This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Read more...
 

eLearning security - the protection of elearning courses from intellectual property theft

NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Read more...
 

eLearning security - the protection of elearning courses from intellectual property theft

NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Read more...
 

 Document Security - the protection of confidential information from intellectual property theft

The Austin Diagnostic Clinic had to protect confidential information contained in their management documents so that it could be made available to physicians who could not make it to management meetings.

Read more...
 

Protect your document & intellectual property with Locklizard

In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Read more...
 

Encryption is not enough for DRM

This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection.  It covers key management, enforcing time limitations, and other methods of document control.

Read more...
 

Information Leakage - the enemy is within

This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.
Read more...
 

 Email As Part Of a Business Continuity Strategy

Email has become an integral part of business and it’s crucial to include it in business continuity planning.
Read more...
 
12 Steps to Ensuring Good Evidential Quality of Email
Litigants in the United States are required by law to give discovery of ‘electronically stored information’ (ESI). The obligations are found in the 2006 modification to the Federal Rules of Civil Procedure (FRCP).
Read more...
 
Using a Hosted Service for Holistic E-mail Management
To meet the demands imposed by regulatory requirements – while protecting themselves against litigation-related discovery requests and safeguarding their networks against security breaches – organizations are turning to email management and other messaging solutions that provide functionality for archiving, business continuity and security.
Read more...
 
 The Critical Role of Data Loss Prevention in Governance Risk and Compliance
Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Security is a holistic issue.
Read more...
 
tmAddressing Compliance Requirements for Privacy, Data Retention, and e-Discovery
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries.
Read more...
 

ibmEnabling Dynamic Business Applications with BPM and SOA - Forrester Consulting on behalf of IBM

IBM commissioned Forrester Consulting to survey 300 business and IT leaders from US and UK to determine the level of common understanding and alignment between business and IT groups on key issues related to impact of their existing processes on operational efficiency and business innovation and how BPM and SOA could improve the overall value their business processes deliver.
Read more...
 

d7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction

Whether protecting five servers or 5,000, measuring the security status of your infrastructure and your organization's ability to rapidly mitigate emerging threats needs to be continuously monitored and measured.
Read more...
 
Page 19 of 22

  Most Popular | All