HIPPA Reports

Protecting Vital Business Interests with a Simplified Storage Solution
sponsored by Dell | EMC
PRODUCT LITERATURE: Effective storage systems have become a critical element of enterprise operations. This paper explains how Dell Services enables organizations to maximize business continuity and mitigate the risk of disaster or litigation.
Posted: 08 Aug 2008 | Published: 01 Nov 2007

Dell | EMC

Realizing Business Value in Managed File Transfer
sponsored by Globalscape
WHITE PAPER: Managed File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data.
Posted: 16 Apr 2008 | Published: 15 Apr 2008

Globalscape

The Role of Password Management in Achieving Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This paper will look at the dramatic impact password management solutions have had on organizations.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Aligning Business and IT through Connected Requirements: Unifying the Development Process
sponsored by IBM
WHITE PAPER: Check out this white paper to learn how the connected-requirements approach serves as the framework for the use of products and technologies that are designed to allow you to optimize team performance, align the development process with your organization's business goals and meet auditing and regulatory compliance requirements.
Posted: 20 Feb 2009 | Published: 01 Oct 2008

IBM

Enabling Sustainable Compliance Management
sponsored by IBM
WHITE PAPER: Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
Posted: 22 Dec 2008 | Published: 19 Dec 2008

IBM

In the Interest of the Patient
sponsored by IBM Line of Business
WHITE PAPER: This paper explores how by collaborating and sharing data, the two industries can realize the full value of the information they collect--and improve patient treatments.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

IBM Line of Business

Presentation Transcript: Data Masking Essentials for SAP Software
sponsored by IBM
PRESENTATION TRANSCRIPT: In this paper Sandeep S. Desai and Cynthia Babb explain about the IBM and Enterprise data management, how to protect privacy, what's at stake and data privacy in a sap environment.
Posted: 11 Feb 2009 | Published: 11 Feb 2009

IBM

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by TechTarget Security
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

TechTarget Security

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.

Information-Centric Security and Data Erasure
sponsored by EMC Corporation
WHITE PAPER: Most data security spending today goes to protecting devices and infrastructure, while little goes to protecting the stored data itself. In this white paper ESG analysts discuss the particulars of information security and data erasure.
Posted: 26 Sep 2006 | Published: 01 Jul 2006

EMC Corporation