Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Building a big data practice

        For IT solution providers, there's big money in big data. That's because data volumes are growing at staggering rates, and SMBs are discovering use cases for big data. Perhaps even better for the channel, many SMBs don't have the skills needed to carry out big data projects. Yet big data is a largely untapped opportunity for the channel. This handbook aims to help solution providers that want to build a big data practice do so, with an exploration of where the biggest opportunities lay, how to build business cases, prep staff members, stand out from competitors, as well as a look at the steps two Microsoft partners have taken to build successful big data practices.

        View E-Handbook
      • Implementing two-tier ERP with manufacturing in mind

        Manufacturers that need to extend their ERP systems to remote locations are considering smaller, lightweight ERP suites as an alternative. With a two-tier ERP system, organizations can consolidate systems and save money while increasing operational efficiency.

        This three-part guide examines the homework organizations need to do -- analyzing costs and benefits -- to make an effective, informed business case for two-tier ERP. First, SearchSAP's Todd Morrison explores the potential cost savings and deployment advantages of two-tier systems -- it will shed light on why the manufacturing industry is so bent on it. Next, Morrison looks at the options available to organizations that have decided to go ahead and implement a second-tier system. It's important to determine the best fit, and there are three to choose from. Veteran IT journalist Lauren Gibbons Paul talks to industry insiders about process improvements available to organizations not quite ready to deploy a whole new ERP system.

        View E-Handbook
    • Page 1 of 1
      • Designing an effective business continuity plan

        Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Technology tools, policies for a corporate compliance program

        At many organizations, departments operate in silos, with a lack of communication leading to redundant or inefficient processes. But business leaders are increasingly looking to link disparate departments from an information governance, risk management and regulatory compliance standpoint. In this SearchCompliance handbook, we examine the technology tools and policies that can support an organization-wide corporate compliance program.

        In our first piece, Jeffrey Ritter discusses governance, risk and compliance (GRC) considerations when organizations make IT investments. In the second story, Jeffrey Jenkins speaks to the important role that communication and corporate culture play in ensuring IT policies and procedures remain regulatory compliant. In our final piece, Christine Parizo explains how GRC platforms have evolved to meet compliance needs, and how one bank has reaped the benefits.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Data loss prevention strategies, practices and tools

        Data loss prevention strategies, practices and tools are more important than ever. Find out why smaller organizations are starting to pay attention to DLP, some do's and don't for keeping intellectual property safe and how to prevent sensitive information from leaking outside your organization. Read this e-book for expert advice on DLP, encryption, risk management and more.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Develop record retention schedules based on governance needs

        As companies generate more data than ever, tracking and maintaining relevant legal and regulatory data is increasingly vital -- and a solid records retention schedule is a must. This SearchCompliance handbook examines best practices and strategies for developing and implementing record retention schedules to ensure organizations are keeping the right information -- and not prematurely destroying critical data. In our first piece, ARMA International CEO Marilyn Bier discusses why the record retention schedule lies at the heart of an information governance program. In our second piece, contributor Christine Parizo explains how organizations can establish data retention schedules that meet various compliance needs. In the final piece, Site Editor Ben Cole tells us how a record retention schedule can reduce data-related risk and even boost the bottom line.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Using predictive coding to your e-discovery advantage

        The big data explosion creates numerous information management and legal concerns for modern organizations. Technology is beginning to catch up, however: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm.

        In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. The first article examines how predictive coding optimizes e-discovery and information governance, as well as searches for electronically stored information in the court of law. The second piece looks at why predictive coding cannot fully replace human review. The last article looks at how thinking outside the box when it comes to e-discovery tools and strategies could change the face of information asset management.

        View E-Handbook
      • Guide to managing the e-discovery process

        Although e-discovery can be complicated, time-consuming and expensive – it is necessary in order to avoid the costly fines associated with non-compliance. In this expert e-book, gain further insight into the process of e-discovery and learn how to ease the process, while ensuring compliance with regulations.

        View E-Book
      • Email retention: Standards and practices

        Electronic records are as real as paper documents, and require a strong retention management strategy. In this SearchCompliance.com e-book, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization and how to use management tools for your electronic records requests? Find the right strategy and tools for retention and recovery to stay compliant. You'll also learn how businesses are even making use of social media, instant messaging and texts for retention strategies.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Cloud computing risk management, governance and compliance

        Cloud computing risk management, governance and compliance processes are evolving as organizations increasingly turn to cloud services for storage, infrastructure and software needs, rather than running their own. But in moving to the cloud, enterprises also potentially expose themselves to myriad threats. In this SearchCompliance handbook, we examine how compliance officers reduce this risk.

        In the first story, Christine Parizo speaks with practitioners and experts about how to maintain security and compliance as part of a larger cloud computing risk management strategy, and offers a checklist of questions to ask your cloud providers about their GRC readiness. In our second piece, Ben Cole examines how services and tools have evolved in the face of regulatory and cloud risk management concerns. In our final piece, Karen Goulart discusses how enterprise cloud strategies reflect a renewed focus on security, and looks at why cost reduction is no longer the bottom line in cloud adoption.

        View E-Handbook
      • Cloud information governance: Alleviate risk, stay compliant

        Moving operations to the cloud is an increasingly popular way for organizations to save money and other resources -- and, as many compliance officers have learned, it also requires dramatic changes to organizational policies to establish proper cloud information governance practices. This SearchCompliance handbook examines how today's organizations are weaving cloud into their IT operations, and how compliance-minded leaders are implementing sturdy cloud information governance controls. In our first piece, ARMA International CEO Marilyn Bier lays out the case for keeping your organization's cloud providers accountable. In our second piece, contributor Christine Parizo delves into the specifics of cloud negotiations for today's enterprise. In the final piece, expert Ed Moyle discusses how to maintain proper governance, risk and compliance controls during a cloud deployment.

        View E-Handbook
      • Risk management for cloud computing

        As more enterprises move IT operations to the cloud, risk management remains a top concern. In fact, security still remains a major roadblock for organizations looking to reap the cost and efficiency benefits of the cloud. Still, a recent SearchCompliance.com survey indicated that 40% of respondents have plans to increase cloud security spending in the coming months. This expert handbook provides in-depth insight and risk management advice for IT leaders looking to benefit from the cloud. Read now for 20 questions that should be asked of every cloud provider, as well as well as advice for creating harmony between compliance and information security functions, and much more.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • New rules for HIPAA

        Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved and more.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • NERC compliance: What you need to know

        The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this e-book to find out what responsible entities need to do to comply with the NERC. Also hear from experts who say the NERC still isn’t doing enough -- and how security measures for critical infrastructure should be increased moving into the future.

        View E-Book
      • Understanding the Massachusetts Data Protection Law

        Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. The prudent move by corporate IT is to take steps to be ready for tough encryption and policy statements. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Information governance takes the next step forward

        The growing adoption of enterprise content management tools for e-discovery, log management and integrated content archiving is advancing information governance strategies. The growing interest in ECM and accompanying tools have helped advance the information governance initiatives of many compliance shops. But as with most technology initiatives, the benefits created by some of these tools can have drawbacks as well. Read this e-book for tips and tricks for designing an effective information governance strategy today.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Log management tightens data security and IT performance

        Log management is a compliance cornerstone in today's enterprise IT environment. The chief benefit of log management is the way in which it offers IT compliance officers the ability to ferret out malicious behaviors and data security threats posed both by internal users and external threats. Given the proliferation of data in modern organizations and corresponding concerns about unauthorized access, this is not a minor consideration. A committed log management strategy can also help IT executives sort through operational bottlenecks at all levels of the enterprise by cataloging incidents and allowing for a simpler review of this information. In this log management buyer's guide, find out how a log management program can guide you in managing your organization's security and operational concerns. This guide also contains a list of vendors offering their services in the log management arena.

        View E-Book
      • Guide to log management for compliance

        Log management has become an increasingly important part of managing information technology across the enterprise. For IT managers, it's a challenge to aggregate, collating, and distributing information from many logs to create meaningful analysis and reporting. Senior managers are also taking an increasing interest in log management software as a powerful tool for improving information security and meeting regulatory compliance mandates. This e-book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Enterprise compliance and security: The ties that bind

        Enterprise compliance and security departments sometimes have a fractious relationship, the two essential functions struggling to establish common ground and work together to protect the organization as a whole. In this SearchCompliance handbook, we examine the balancing act inherent in enterprise compliance and security operations, and provide advice on rising above the politics.

        In our first piece, expert Ed Moyle looks at the sometimes-adversarial relationship between enterprise compliance and security functions and the benefits of aligning their strategic objectives. In the second piece, author Christine Parizo tells us why compliant doesn't always equal secure, and vice versa, and how you can stay on the right side of the equation. In our final piece, editor Ben Cole delves into the role of risk assessments in maintaining organization-wide enterprise compliance and security efforts.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Governance, risk, compliance: Policy management methods and tools

        IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this e-book to learn more about risk management and evaluating GRC solutions. Find out how to strike the right balance with risk management in your organization, and how to navigate the market to select the best governance, risk and compliance software to meet your needs.

        View E-Book
      • Regulatory compliance for the midmarket: Governance, risk and technology

        Read this e-book to learn about how you can take a proactive approach to regulatory compliance. Because of cost concerns, many midsized companies are tackling one regulation at a time, which ultimately leads to a waste of resources and an increase in risk. Rather than waste time and resources tackling one regulation at a time, find out how successful companies are looking at the big picture and forming security strategies based on their needs.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1

Featured E-ZINES on searchCompliance.comView all >>

  • CIO Decisions

    Enterprise CIO Decisions Ezine offers IT and business strategies and insights on the latest technologies making waves in the modern IT organization.

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchCompliance.comView all >>

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchCompliance.comView all >>

  • Building a big data practice

    For IT solution providers, there's big money in big data. That's because data volumes are growing at staggering rates, and SMBs are discovering use cases for big data. Perhaps even better for the channel, many SMBs don't have the skills needed to carry out big data projects. Yet big data is a largely untapped opportunity for the channel. This handbook aims to help solution providers that want to build a big data practice do so, with an exploration of where the biggest opportunities lay, how to build business cases, prep staff members, stand out from competitors, as well as a look at the steps two Microsoft partners have taken to build successful big data practices.

  • Implementing two-tier ERP with manufacturing in mind

    Manufacturers that need to extend their ERP systems to remote locations are considering smaller, lightweight ERP suites as an alternative. With a two-tier ERP system, organizations can consolidate systems and save money while increasing operational efficiency.

    This three-part guide examines the homework organizations need to do -- analyzing costs and benefits -- to make an effective, informed business case for two-tier ERP. First, SearchSAP's Todd Morrison explores the potential cost savings and deployment advantages of two-tier systems -- it will shed light on why the manufacturing industry is so bent on it. Next, Morrison looks at the options available to organizations that have decided to go ahead and implement a second-tier system. It's important to determine the best fit, and there are three to choose from. Veteran IT journalist Lauren Gibbons Paul talks to industry insiders about process improvements available to organizations not quite ready to deploy a whole new ERP system.

OTHER FEATURED E-HANDBOOKS