Premium Content

searchCompliance E-Books

Featured E-Books

  • Log management tightens data security and IT performance

    Log management is a compliance cornerstone in today's enterprise IT environment. The chief benefit of log management is the way in which it offers IT compliance officers the ability to ferret out malicious behaviors and data security threats posed both by internal users and external threats. Given the proliferation of data in modern organizations and corresponding concerns about unauthorized access, this is not a minor consideration. A committed log management strategy can also help IT executives sort through operational bottlenecks at all levels of the enterprise by cataloging incidents and allowing for a simpler review of this information. In this log management buyer's guide, find out how a log management program can guide you in managing your organization's security and operational concerns. This guide also contains a list of vendors offering their services in the log management arena.

    Download Now

  • Compliance strategy 2.0: Comprehensive, scalable and sustainable systems

    This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to their compliance strategy, what strategies work and what technologies and practices you can leverage.

    Download Now

Other E-Books available for free to our members

    • Page 1 of 3
      • Risk management planning: Safeguarding against a world of threats

        Access this expert e-book to discover all the different components to consider during the risk management planning process. Uncover the importance of accurate risk management metrics, and learn why governance, risk, and compliance are a unified framework. Plus, find out what four components your risk management strategy may be missing, and more.

        View E-Book
      • Guide to managing the e-discovery process

        Although e-discovery can be complicated, time-consuming and expensive – it is necessary in order to avoid the costly fines associated with non-compliance. In this expert e-book, gain further insight into the process of e-discovery and learn how to ease the process, while ensuring compliance with regulations.

        View E-Book
      • Designing an effective business continuity plan

        Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

        View E-Book
      • Data protection plans for complying with privacy laws

        This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection plan, as well as how to use database security auditing tools, how to secure your mainframe, laptop encryption and more!

        View E-Book
      • Information governance takes the next step forward

        The growing adoption of enterprise content management tools for e-discovery, log management and integrated content archiving is advancing information governance strategies. The growing interest in ECM and accompanying tools have helped advance the information governance initiatives of many compliance shops. But as with most technology initiatives, the benefits created by some of these tools can have drawbacks as well. Read this e-book for tips and tricks for designing an effective information governance strategy today.

        View E-Book
      • New rules for HIPAA

        Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved and more.

        View E-Book
      Page 1 of 3
    • Page 1 of 1
      • Guide to managing the e-discovery process

        Although e-discovery can be complicated, time-consuming and expensive – it is necessary in order to avoid the costly fines associated with non-compliance. In this expert e-book, gain further insight into the process of e-discovery and learn how to ease the process, while ensuring compliance with regulations.

        View E-Book
      • Email retention: Standards and practices

        Electronic records are as real as paper documents, and require a strong retention management strategy. In this SearchCompliance.com e-book, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization and how to use management tools for your electronic records requests? Find the right strategy and tools for retention and recovery to stay compliant. You'll also learn how businesses are even making use of social media, instant messaging and texts for retention strategies.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Governance, risk, compliance: Policy management methods and tools

        IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this e-book to learn more about risk management and evaluating GRC solutions. Find out how to strike the right balance with risk management in your organization, and how to navigate the market to select the best governance, risk and compliance software to meet your needs.

        View E-Book
      • Regulatory compliance for the midmarket: Governance, risk and technology

        Read this e-book to learn about how you can take a proactive approach to regulatory compliance. Because of cost concerns, many midsized companies are tackling one regulation at a time, which ultimately leads to a waste of resources and an increase in risk. Rather than waste time and resources tackling one regulation at a time, find out how successful companies are looking at the big picture and forming security strategies based on their needs.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Designing an effective business continuity plan

        Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • New rules for HIPAA

        Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved and more.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Data loss prevention strategies, practices and tools

        Data loss prevention strategies, practices and tools are more important than ever. Find out why smaller organizations are starting to pay attention to DLP, some do's and don't for keeping intellectual property safe and how to prevent sensitive information from leaking outside your organization. Read this e-book for expert advice on DLP, encryption, risk management and more.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Log management tightens data security and IT performance

        Log management is a compliance cornerstone in today's enterprise IT environment. The chief benefit of log management is the way in which it offers IT compliance officers the ability to ferret out malicious behaviors and data security threats posed both by internal users and external threats. Given the proliferation of data in modern organizations and corresponding concerns about unauthorized access, this is not a minor consideration. A committed log management strategy can also help IT executives sort through operational bottlenecks at all levels of the enterprise by cataloging incidents and allowing for a simpler review of this information. In this log management buyer's guide, find out how a log management program can guide you in managing your organization's security and operational concerns. This guide also contains a list of vendors offering their services in the log management arena.

        View E-Book
      • Guide to log management for compliance

        Log management has become an increasingly important part of managing information technology across the enterprise. For IT managers, it's a challenge to aggregate, collating, and distributing information from many logs to create meaningful analysis and reporting. Senior managers are also taking an increasing interest in log management software as a powerful tool for improving information security and meeting regulatory compliance mandates. This e-book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • NERC compliance: What you need to know

        The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this e-book to find out what responsible entities need to do to comply with the NERC. Also hear from experts who say the NERC still isn’t doing enough -- and how security measures for critical infrastructure should be increased moving into the future.

        View E-Book
      • Understanding the Massachusetts Data Protection Law

        Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. The prudent move by corporate IT is to take steps to be ready for tough encryption and policy statements. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Information governance takes the next step forward

        The growing adoption of enterprise content management tools for e-discovery, log management and integrated content archiving is advancing information governance strategies. The growing interest in ECM and accompanying tools have helped advance the information governance initiatives of many compliance shops. But as with most technology initiatives, the benefits created by some of these tools can have drawbacks as well. Read this e-book for tips and tricks for designing an effective information governance strategy today.

        View E-Book
      •  
      Page 1 of 1