Legal

Social media and the collection and retention of data are topics in the courts now. Learn what you need to know to protect yourself and your company.

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes HIPAA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet HIPAA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Jul 2013

    Gartner 2013 Magic Quadrant for Application Security Testing

    Gartner has just published the results of their Magic Quadrant (MQ) on the Application Security Testing (AST) market and IBM was rated as the leader. According to Gartner, to be positioned in the Leaders Quadrant for Application Security Testing (AST), vendors must demonstrate both "completeness of vision" and an "ability...

    Sponsored By IBM

  • White Papers // Nov 2013

    Best Practices Guide for IT Governance & Compliance

    Federal regulations require businesses to know exactly what changes are made to structured and unstructured data within their corporate networks. Learn how the best practices for implementing a compliance solution in this white paper can help you minimize stress during your next IT compliance audit.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Compensation Made Simple

    Using market-based salary data to align your organization’s compensation strategy with those in the same recruiting market can enable your organization to stay competitive and improve employee engagement and retention. Read this paper to learn more about: How a business's lifecycle influences employee compensation, Why market-based salary data...

    Sponsored By IBM

  • White Papers // Aug 2013

    Controlling and Managing Superuser Access

    Every business needs privileged account users. Unfortunately, most operating systems offer all-or-nothing solutions. This white paper explores the risks associated with privileged accounts, and explains how Dell solutions can mitigate those risks. Download the white paper today to learn more.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Securing Big Data HADOOP Performance with Vormetric Transparent Encryption

    This White Paper shows the performance of several benchmark tests of Vormetric Transparent Encryption running on a Cloudera HADOOP system using several different workloads. The overhead is minimal and within acceptable norms of performance vs. security tradeoffs.

    Sponsored By Vormetric

  • White Papers // Apr 2013

    TCO Analysis of a Traditional Data Center vs. a Scalable, Containerized Data Center

    Standardized, scalable, pre-assembled, and integrated data center facility power and cooling modules provide a “total cost of ownership” (TCO) savings of 30% compared to traditional, built-out data center power and cooling infrastructure. Avoiding overbuilt capacity and scaling the design over time contributes to a significant percentage of the overall savings....

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2014

    PCI Compliance and Mobile Devices

    The Payment Card Industry (PCI) Security Standards Council has released the Data Security Standards (DSS) version 3.0 outlining revised requirements for payment data security, effective January 1st, 2014. Merchants and Service Providers that store, process, or transmit customer payment card data must adhere to the revised outlined requirements. Additionally, the...

    Sponsored By MobileIron

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes PCI DSS Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet PCI DSS guidelines today and tomorrow. Download...

    Sponsored By Dell Software

  • Downloads // Jan 2014

    Top 5 Reasons to Choose SolarWinds Log & Event Manager (LEM)

    Real-Time, In-Memory, Event Log Correlation: Troubleshoot performance problems by understanding the relationship between different activities using multiple event correlations Out-of-the-Box Security and Compliance Reporting Templates: Quickly & easily generate and schedule compliance reports using over 300 audit-proven templates USB Defense: Protect against endpoint data loss &...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    Pay for Performance...Are You Ready?

    This white paper discussed the elements that comprise a pay-for-performance system and how compensation professionals can effectively implement one. Download your copy of the white paper to learn more about: Pay for performance vs. increase for performance Cost of labor vs. cost of living Differentially rewarding

    Sponsored By IBM

  • White Papers // Aug 2014

    Foglight Solutions for Cross-Platform Database Performance Management

    Achieving consistent service levels for cross-platform database environments is next to impossible using each platform’s native tools. Foglight database monitoring software simplifies database monitoring and management, enabling you to consolidate and standardize database performance across multiple platforms. Download the white paper to learn how.

    Sponsored By Dell Software

  • Videos // May 2014

    Video: Financial Management Built from the Cloud Up (Epipheo)

    Does your financial management system have a bunch of bolt-on applications that slow down your business? Is your system inflexible? Expensive? Impossible to upgrade? Watch the video to see how Workday designed a different kind of financial management system, one that's built from the cloud up with everything you need.

    Sponsored By Workday

  • Videos // May 2014

    Webinar: Surviving and Thriving in a World of Change

    It’s impossible to keep up with today’s constant change in financial management systems and regulations, right? Nope—not anymore. In this webinar, CFO.com, TripAdvisor, and Workday discuss how cloud-based systems are helping finance leaders everywhere embrace change.

    Sponsored By Workday

  • Videos // May 2014

    Video Infographic: The Cloud for Finance is Here

    In 2013, global IT business research firm Saugatuck Technology surveyed more than 270 finance and IT executives in North America. They were asked about their experience, expectations, and attitudes toward their existing finance management systems. Watch our video infographic to see the results.

    Sponsored By Workday

  • Videos // May 2014

    Video: The Workday Advantage: Financial Management in the Cloud

    In this video, Mark Nittler, vice president of enterprise strategy at Workday, speaks to the limitations of traditional financial software systems and how Workday’s modern financial management Software as a Service (SaaS) solution overcomes these challenges, making it simpler and safer to run global financials in the cloud.

    Sponsored By Workday

  • Videos // May 2014

    Video Series: The Future of Finance is Now (5 videos)

    In this 5-part video series, Mark Nittler, vice president of enterprise strategy at Workday, explains how legacy finance systems can't keep up with the needs of today's enterprise. You’ll learn how the next generation of financial management focuses on speed, agility, cost, and insights—all delivered in the cloud.

    Sponsored By Workday

  • White Papers // Jul 2014

    Global Compliance and The Legal Obligations for Encryption of Personal Data

    Updated for 2014, this document examines the global legal obligations to encrypt personal data – included both national and industry drivers. National focuses include the EU (the United Kingdom, France, Germany and Spain), the USA, Asia (Singapore, South Korea, Japan and Taiwan) and Australia. The industry focus is most strongly...

    Sponsored By Vormetric

  • White Papers // Jul 2014

    The Federal Government Should Have NIST As Well

    Critical to certification for meeting FIPS, is the implementation of security controls from NIST 800-53, Appendix F. Focusing on the capabilities needed to meet these requirements, this paper provides background about the Vormetric Data Security Platform and the Vormetric Transparent Encryption product that is delivered through that platform.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    The Use of Ceiling-Ducted Air Containment in Data Centers

    Ducting hot IT-equipment exhaust to a drop ceiling can be an effective air management strategy, improving the reliability and energy efficiency of a data center. Typical approaches include ducting either individual racks or entire hot aisles and may be passive (ducting only) or active (include fans). This paper examines available...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2014

    2014 Insider Threat Report

    The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal...

    Sponsored By Vormetric

  • Videos // May 2014

    Webinar: 2014 Predict and Prepare LP

    Watch today’s top HR, technology, and finance experts as they talk about their predictions for the critical trends, directions, and implications in 2014, and offer valuable advice on how you should prepare to stay ahead and capitalize.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: A New Way to Work (Mobile)

    Mobile devices are everywhere, and every employee in your enterprise has one. In order to give employees access to the information they need, your apps must work collaboratively, on the go, and in real-time. Watch this webinar for an overview of Workday's current offerings for mobile HR and finance applications.

    Sponsored By Workday

  • White Papers // Oct 2013

    Comparing Data Center Power Distribution Architectures

    Significant improvements in efficiency, power density, power monitoring, and reconfigurability have been achieved in data center power distribution, increasing the options available for data centers. This paper compares five power distribution approaches including panelboard distribution, field-wired PDU distribution, factory-configured PDU distribution, floor-mount modular power distribution, and modular busway, and describes...

    Sponsored By APC by Schneider Electric

  • White Papers // Apr 2013

    Implementing Hot and Cold Air Containment in Existing Data Centers

    Containment solutions can eliminate hot spots and provide energy savings over traditional uncontained data center designs. The best containment solution for an existing facility will depend on the constraints of the facility. While ducted hot aisle containment is preferred for highest efficiency, cold aisle containment tends to be easier and...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2014

    HIPAA Mobile Compliance

    Mobile is becoming a core platform for healthcare communications and services. As information access expands to more people and more devices, mobile creates new systems and processes that are subject to HIPAA compliance. The MobileIron security and management platform includes controls for the following key elements of a HIPAA...

    Sponsored By MobileIron

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes SOX Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet SOX guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes FISMA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet FISMA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Ensuring Enterprise Visibility, Auditing and Reporting

    Learn how to easily identify and report on who has access to what files, folders and shares (and on what servers) in Active Directory. Plus, reduce the risk of security breaches and compliance failures in the process. Read this insightful tech brief.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Combatting Digital Fraud: A CIO Report

    Combating digital fraud has become a business issue and presents risk for any organization with online operations. Gain perspective from CIOs on what organizations can do to prevent fraud in digital commerce.

    Sponsored By RSA

  • eBooks // Feb 2014

    Marketing: Connecting with the Chief Executive Customer

    CMOs and their marketing teams are squarely in the spotlight as organizations look to them to chart a course across today’s turbulent landscape. The pressure is intense, the scope of the challenge unprecedented.

    Sponsored By IBM

  • eBooks // Oct 2014

    Seeing Managed File Transfer as Strategic: Business Users Need Full Visibility

    Read this e-book to find out how you can create your own innovative approach to managed file transfer—one that ensures reliable, convenient and secure file transfers across every business process.

    Sponsored By IBM

  • White Papers // Mar 2014

    Leverage Security Intelligence for Financial Services Institutions

    IBM QRadar Security Intelligence Platform integrates SIEM, log management, risk management and network behavior analytics into a total security intelligence solution to provide the deep network visibility - and added security - that financial organizations require.

    Sponsored By IBM

  • White Papers // Mar 2014

    Leverage Security Intelligence for Retail

    IBM QRadar Security Intelligence Platform can serve as the foundation of retail organizations’ network defense capabilities, helping to guard against an expanding population of attackers seeking everything from credit card data to intellectual property to customer shopping behaviors.

    Sponsored By IBM

  • White Papers // Aug 2014

    Frost & Sullivan awards IBM 2014 Customer Value Leadership Award for Mobile Identity and Access Management Solution

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Apr 2014

    Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

    Sponsored By F5

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Jun 2014

    2014 Cost of Data Breach Study, From Ponemon Institute, Sponsored by IBM

    IBM sponsored the and Ponemon Institute examined the actual costs of data breaches at 61 US companies and drew on the results of more than 500 interviews to reveal the true costs of data breaches today, from detection and escalation to customer churn. Read the analyst research to find out...

    Sponsored By IBM