Legal Compliance White Papers

(View All Report Types)
Cloud Computing in Perspective
sponsored by BMC Software, Inc.
WHITE PAPER: Many CIOs recognize the power of cloud computing and are looking to implement the technology in their own IT realms. But with all the noise in the market about cloud computing, how do you know where to begin? Learn how to better improve service delivery to your business with cloud computing.
Posted: 26 Jan 2010 | Published: 26 Jan 2010

BMC Software, Inc.

Governance and control: Focus risk management on multiple levers of control
sponsored by IBM
WHITE PAPER: Written by Jeremy Hope from Beyond Budgeting Round Table, this paper describes how CFOs should set the highest standards of ethical reporting and behavior.
Posted: 01 Nov 2011 | Published: 01 Apr 2009

IBM

Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance
sponsored by Oracle Corporation
WHITE PAPER: When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

The Information Agenda: Rapidly Leveraging Information as a Trusted Strategic Asset for Competitive Advantage
sponsored by IBM
WHITE PAPER: As the CIO of a flourishing business, you are happy to report that the current information projects are going well. The new call center is up and running, the new data warehouse is on-line, and the new customer loyalty systems have been deployed successfully.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

IBM

Holistic risk management: Perspectives for IT professionals
sponsored by IBM
WHITE PAPER: Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Posted: 28 Jun 2012 | Published: 16 Oct 2012

IBM

A Virtualization Roadmap from Dell and Intel
sponsored by DellEMC and Intel®
WHITE PAPER: Virtualization is more than a technology. It is a way of thinking about problems that allow us to go beyond the physical limitations nor­mally associated with entire classes of hardware, from servers to storage. Attaining the maximum benefits of virtualization, however, requires a plan and constant monitoring to ensure peak performance.
Posted: 29 Apr 2010 | Published: 29 Apr 2010

DellEMC and Intel®

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Enabling Continuous Compliance Across the Enterprise
sponsored by IBM
WHITE PAPER: Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Achieving PCI Compliance with Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis.
Posted: 20 Aug 2009 | Published: 19 Aug 2009

Red Hat and JBoss