Compliance (Security) White Papers

(View All Report Types)
Managed Compliance: Streamlining Multiple Compliance Mandates with Visibility, Intelligence, and Automation
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides IT security and compliance professionals a roadmap and practical advice for implementing an approach to compliance that helps overcome IT security issues.
Posted: 08 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Novell, Inc.

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM

Counterparty Risk: Are We Leveraging Our Tools?
sponsored by Sybase, an SAP company
WHITE PAPER: While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more.
Posted: 22 Feb 2012 | Published: 22 Feb 2012

Sybase, an SAP company

Delivering Enterprise Value with Oracle Governance, Risk & Compliance
sponsored by Oracle Corporation
WHITE PAPER: In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

The Information Agenda: Rapidly Leveraging Information as a Trusted Strategic Asset for Competitive Advantage
sponsored by IBM
WHITE PAPER: As the CIO of a flourishing business, you are happy to report that the current information projects are going well. The new call center is up and running, the new data warehouse is on-line, and the new customer loyalty systems have been deployed successfully.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

IBM

Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Records Management’s Breaking Point: Managing Electronic Records in High-Volume Environments
sponsored by ASG Software Solutions
WHITE PAPER: This White paper outlines issues that make manging transactional electronic records challenging, demonstrates why organizations need to tame the high volume transactional records beast, and lastly, describes what to look for in a transactional electronic records management solution.
Posted: 15 Apr 2011 | Published: 15 Apr 2011

ASG Software Solutions

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM