Compliance (Security) Reports

Focus: Analytics & data-driven insights
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, learn about the state of adoption of data analytics in Australia, how Commonwealth Bank is making analytics tools more accessible to small companies and how SAS is prepping its marketers for the data flood.
Posted: 08 Feb 2021 | Published: 02 Jun 2017

TechTarget ComputerWeekly.com

GFI FAXmaker for Exchange/SMTP/Lotus
sponsored by GFI Software
PRODUCT DEMO: Download this free trial of GFI Faxmaker to improve efficiency of business processes, provide backup for fax documents to increase compliance and help reduce time IT admins spend on fax errors.
Posted: 11 Oct 2007 | Premiered: 01 Oct 2007

GFI Software

From Unstructured to Structured: Transforming Documents into Knowledge
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: As global marketplace and compliance laws become more complex, the need for enterprise content management systems has never been greater. Learn how electronic document management technology can increase ROI and secure information sensitive documents.
Posted: 14 Sep 2007 | Published: 01 Sep 2007

Pitney Bowes Group 1 Software

Virtualization Is Key to Storage Consolidation
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Many organizations have consolidated their storage infrastructures and a growing number see storage virtualization as an essential part of an effective consolidation strategy. Read this white paper to learn the benefits delivered from this strategy.
Posted: 01 Nov 2007 | Published: 01 Nov 2007

Hewlett Packard Enterprise

Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE: This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009

Information Security Magazine

Defining Your Corporate Mobile Policies
sponsored by TechTarget Security
EGUIDE: It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008

TechTarget Security

Getting Started with Online Storage for Backup Exec
sponsored by Symantec Corporation
PODCAST: In this podcast, Symantec Product Manager Darren Niller provides a step by step overview of the process on getting started with Symantec Online Storage.
Posted: 29 Feb 2008 | Premiered: Feb 29, 2008

Symantec Corporation

Getting Started with SAP Workload Automation
sponsored by Redwood Software Inc.
WEBCAST: Discover how your organization can benefit from real-time, event-driven process automation and job scheduling, with a single point of control and central monitoring of business processes for SAP systems.
Posted: 07 Sep 2007 | Premiered: Sep 1, 2007

Redwood Software Inc.

Shouldn't Single Sign-on Be Child's Play?
sponsored by Microsoft & Quest Software
WEBCAST: Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure.
Posted: 10 Oct 2008 | Premiered: Nov 4, 2008, 14:00 EST (19:00 GMT)

Microsoft & Quest Software

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.