Compliance (Law) White Papers

(View All Report Types)
Performance Management Applications Overview
sponsored by Oracle Corporation
WHITE PAPER: Hyperion performance management applications deliver a wide range of Business benefits as well as IT benefits; this overview outlines key benefits.
Posted: 12 Oct 2009 | Published: 01 Dec 2008

Oracle Corporation

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

When Desktops Go Virtual: Addressing security challenges in your virtual desktop infrastructure
sponsored by Trend Micro, Inc.
WHITE PAPER: Virtual desktop infrastructure carries the potential for significant savings. However, given the dynamic nature of desktop computing, virtualizing endpoints will raise significant challenges. The temptation will be to treat virtual desktops like datacenter servers when it comes to protection. Read this paper to find out more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Seven Keys to Making or Breaking Your Exchange Infrastructure
sponsored by Dell Software
WHITE PAPER: Exchange Server 2007 changed the way your communications infrastructure operated forever, delivering a potent and powerful e-mail engine. And with Exchange Server 2010, Microsoft’s upped the ante, delivering a more powerful feature set and functionality. But does all of this mean bigger management headaches?
Posted: 03 Nov 2010 | Published: 03 Nov 2010

Dell Software

Iron Mountain EMR Scanning Survey Report
sponsored by Iron Mountain
WHITE PAPER: 70% of hospitals expect to meet EHR meaningful use guidelines this year. Yet, 78% expect to continue to treat patients using paper records for up to 5 more years despite the financial incentive for meeting these requirements. Inside this white paper, learn how your peers are transitioning to an EHR system.
Posted: 15 Sep 2011 | Published: 14 Sep 2011

Iron Mountain

Rebuilding the Banking Landscape: Restoring Customer Confidence and Returning to Growth
sponsored by Micro Focus, Ltd
WHITE PAPER: This paper looks at the ways that banks are having to adapt to rise to these challenges, the constraints they face and how innovative changes in IT infrastructure can release time, money and capacity to meet the demands of the new banking landscape.
Posted: 22 Jul 2010 | Published: 22 Jul 2010

Micro Focus, Ltd

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Mimecast

Risk Never Sleeps: Managing Risk in an Uncertain World
sponsored by SunGard Availability Services
WHITE PAPER: IT professionals are increasingly responsible for doing more than just provisioning servers and maintaining applications – they are core players in the risk management process. Read this whitepaper to learn more.
Posted: 19 Aug 2010 | Published: 19 Aug 2010

SunGard Availability Services

Leveraging XBRL for Value in Organizations
sponsored by ISACA
WHITE PAPER: This white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included.
Posted: 18 Aug 2011 | Published: 18 Aug 2011

ISACA

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine