Legal Compliance Reports

Focus: Analytics & data-driven insights
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, learn about the state of adoption of data analytics in Australia, how Commonwealth Bank is making analytics tools more accessible to small companies and how SAS is prepping its marketers for the data flood.
Posted: 08 Feb 2021 | Published: 02 Jun 2017

TechTarget ComputerWeekly.com

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

The changing SIEM landscape: What you should know to stay ahead
sponsored by TechTarget Security
EGUIDE: While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

TechTarget Security

Data Center Designs to Help Meet Your Compliance Challenge
sponsored by Iron Mountain
WHITE PAPER: This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

Sustainability: From Strategic Objective to Compliance Operation
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

HP & Intel®

Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

TechTarget ComputerWeekly.com

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Healthcare Networking Classroom
sponsored by TechTarget Health IT
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

TechTarget Health IT

October 2013 Health IT E-Zine
sponsored by TechTarget Health IT
EZINE: In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

TechTarget Health IT

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM