Security

Regulatory Compliance: Protecting Sensitive Information in an Increasingly Leaky World

Free registration required

Executive Summary

Information Technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy. The best approach to meeting complex compliance requirements is to focus on highest risk, most-used business systems and employ a combination of trained people, process enforcement, and policy-based security solutions. Trend Micro Data Protection solutions address privacy, e-discovery, and data retention requirements with email encryption, email archiving, and endpoint Data Leak Prevention solutions.

  • Format: PDF
  • Size: 517 KB