Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Business Continuity Management Systems

        This downloadable extract focuses on the practical elements of business continuity management and considers them from a management system perspective: Where should the emphasis be when it comes to fitting your Business Continuity Management (BCM) arrangements into a management system? The chapter uses six phases of the BCM lifecycle as a focal point and offer top tips for you to consider when developing your Business Continuity Management System (BCMS).

        View E-Handbook
      • Guide: Maximizing the Value of Cloud for Small-Medium Enterprises

        Cloud computing models are promising significant cost, scalability, and agility benefits, but is there a business case for small business owners to move from traditional IT provisioning to a cloud-based solution? And, if so, how can small business owners adopt the cloud? This guide is designed to help small business owners navigate through cloud services and identify those that will best help them to meet their needs.

        View E-Handbook
    • Page 1 of 1
      • Designing an effective business continuity plan

        Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Data loss prevention strategies, practices and tools

        Data loss prevention strategies, practices and tools are more important than ever. Find out why smaller organizations are starting to pay attention to DLP, some do's and don't for keeping intellectual property safe and how to prevent sensitive information from leaking outside your organization. Read this e-book for expert advice on DLP, encryption, risk management and more.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Develop record retention schedules based on governance needs

        As companies generate more data than ever, tracking and maintaining relevant legal and regulatory data is increasingly vital -- and a solid records retention schedule is a must. This SearchCompliance handbook examines best practices and strategies for developing and implementing record retention schedules to ensure organizations are keeping the right information -- and not prematurely destroying critical data. In our first piece, ARMA International CEO Marilyn Bier discusses why the record retention schedule lies at the heart of an information governance program. In our second piece, contributor Christine Parizo explains how organizations can establish data retention schedules that meet various compliance needs. In the final piece, Site Editor Ben Cole tells us how a record retention schedule can reduce data-related risk and even boost the bottom line.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Using predictive coding to your e-discovery advantage

        The big data explosion creates numerous information management and legal concerns for modern organizations. Technology is beginning to catch up, however: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm.

        In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. The first article examines how predictive coding optimizes e-discovery and information governance, as well as searches for electronically stored information in the court of law. The second piece looks at why predictive coding cannot fully replace human review. The last article looks at how thinking outside the box when it comes to e-discovery tools and strategies could change the face of information asset management.

        View E-Handbook
      • Guide to managing the e-discovery process

        Although e-discovery can be complicated, time-consuming and expensive – it is necessary in order to avoid the costly fines associated with non-compliance. In this expert e-book, gain further insight into the process of e-discovery and learn how to ease the process, while ensuring compliance with regulations.

        View E-Book
      • Email retention: Standards and practices

        Electronic records are as real as paper documents, and require a strong retention management strategy. In this SearchCompliance.com e-book, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization and how to use management tools for your electronic records requests? Find the right strategy and tools for retention and recovery to stay compliant. You'll also learn how businesses are even making use of social media, instant messaging and texts for retention strategies.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Cloud computing risk management, governance and compliance

        Cloud computing risk management, governance and compliance processes are evolving as organizations increasingly turn to cloud services for storage, infrastructure and software needs, rather than running their own. But in moving to the cloud, enterprises also potentially expose themselves to myriad threats. In this SearchCompliance handbook, we examine how compliance officers reduce this risk.

        In the first story, Christine Parizo speaks with practitioners and experts about how to maintain security and compliance as part of a larger cloud computing risk management strategy, and offers a checklist of questions to ask your cloud providers about their GRC readiness. In our second piece, Ben Cole examines how services and tools have evolved in the face of regulatory and cloud risk management concerns. In our final piece, Karen Goulart discusses how enterprise cloud strategies reflect a renewed focus on security, and looks at why cost reduction is no longer the bottom line in cloud adoption.

        View E-Handbook
      • Cloud information governance: Alleviate risk, stay compliant

        Moving operations to the cloud is an increasingly popular way for organizations to save money and other resources -- and, as many compliance officers have learned, it also requires dramatic changes to organizational policies to establish proper cloud information governance practices. This SearchCompliance handbook examines how today's organizations are weaving cloud into their IT operations, and how compliance-minded leaders are implementing sturdy cloud information governance controls. In our first piece, ARMA International CEO Marilyn Bier lays out the case for keeping your organization's cloud providers accountable. In our second piece, contributor Christine Parizo delves into the specifics of cloud negotiations for today's enterprise. In the final piece, expert Ed Moyle discusses how to maintain proper governance, risk and compliance controls during a cloud deployment.

        View E-Handbook
      • Risk management for cloud computing

        As more enterprises move IT operations to the cloud, risk management remains a top concern. In fact, security still remains a major roadblock for organizations looking to reap the cost and efficiency benefits of the cloud. Still, a recent SearchCompliance.com survey indicated that 40% of respondents have plans to increase cloud security spending in the coming months. This expert handbook provides in-depth insight and risk management advice for IT leaders looking to benefit from the cloud. Read now for 20 questions that should be asked of every cloud provider, as well as well as advice for creating harmony between compliance and information security functions, and much more.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • New rules for HIPAA

        Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved and more.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • NERC compliance: What you need to know

        The North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this e-book to find out what responsible entities need to do to comply with the NERC. Also hear from experts who say the NERC still isn’t doing enough -- and how security measures for critical infrastructure should be increased moving into the future.

        View E-Book
      • Understanding the Massachusetts Data Protection Law

        Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. The prudent move by corporate IT is to take steps to be ready for tough encryption and policy statements. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Information governance takes the next step forward

        The growing adoption of enterprise content management tools for e-discovery, log management and integrated content archiving is advancing information governance strategies. The growing interest in ECM and accompanying tools have helped advance the information governance initiatives of many compliance shops. But as with most technology initiatives, the benefits created by some of these tools can have drawbacks as well. Read this e-book for tips and tricks for designing an effective information governance strategy today.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Log management tightens data security and IT performance

        Log management is a compliance cornerstone in today's enterprise IT environment. The chief benefit of log management is the way in which it offers IT compliance officers the ability to ferret out malicious behaviors and data security threats posed both by internal users and external threats. Given the proliferation of data in modern organizations and corresponding concerns about unauthorized access, this is not a minor consideration. A committed log management strategy can also help IT executives sort through operational bottlenecks at all levels of the enterprise by cataloging incidents and allowing for a simpler review of this information. In this log management buyer's guide, find out how a log management program can guide you in managing your organization's security and operational concerns. This guide also contains a list of vendors offering their services in the log management arena.

        View E-Book
      • Guide to log management for compliance

        Log management has become an increasingly important part of managing information technology across the enterprise. For IT managers, it's a challenge to aggregate, collating, and distributing information from many logs to create meaningful analysis and reporting. Senior managers are also taking an increasing interest in log management software as a powerful tool for improving information security and meeting regulatory compliance mandates. This e-book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Enterprise compliance and security: The ties that bind

        Enterprise compliance and security departments sometimes have a fractious relationship, the two essential functions struggling to establish common ground and work together to protect the organization as a whole. In this SearchCompliance handbook, we examine the balancing act inherent in enterprise compliance and security operations, and provide advice on rising above the politics.

        In our first piece, expert Ed Moyle looks at the sometimes-adversarial relationship between enterprise compliance and security functions and the benefits of aligning their strategic objectives. In the second piece, author Christine Parizo tells us why compliant doesn't always equal secure, and vice versa, and how you can stay on the right side of the equation. In our final piece, editor Ben Cole delves into the role of risk assessments in maintaining organization-wide enterprise compliance and security efforts.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Governance, risk, compliance: Policy management methods and tools

        IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this e-book to learn more about risk management and evaluating GRC solutions. Find out how to strike the right balance with risk management in your organization, and how to navigate the market to select the best governance, risk and compliance software to meet your needs.

        View E-Book
      • Regulatory compliance for the midmarket: Governance, risk and technology

        Read this e-book to learn about how you can take a proactive approach to regulatory compliance. Because of cost concerns, many midsized companies are tackling one regulation at a time, which ultimately leads to a waste of resources and an increase in risk. Rather than waste time and resources tackling one regulation at a time, find out how successful companies are looking at the big picture and forming security strategies based on their needs.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1

Featured E-ZINES on searchCompliance.comView all >>

  • CIO Decisions

    Enterprise CIO Decisions Ezine offers IT and business strategies and insights on the latest technologies making waves in the modern IT organization.

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchCompliance.comView all >>

  • Forging the path to tomorrow's CRM

    Perhaps no two words have more of an effect on business today than "customer experience." Consumers have a wealth of options for buying products and services -- and they're not shy about letting the social media sphere know when they’re not happy. To keep them coming -- and coming back -- organizations need to ensure that the experiences they’re serving up are nothing less than stellar.

    In our e-book series, The Risks and Rewards of Customer Experience Management, readers will get practical advice and real-world insight into strategies that place the focus of organizations' operations and processes on their customers. The first chapter concentrates on automation in the contact center. It will explore the technologies, such as interactive voice response and virtual agents. And it will examine what organizations need to evaluate when deciding which processes to automate and which areas will always need a human touch. The second installment delves into digital marketing, mobile applications and social media. It's no longer enough to send the same message to all customers; messages now must be personalized -- and soon, based on where customers are at any given moment. The chapter will look at location-based automated marketing and the pros and cons -- including the loss of privacy -- associated with such practices. The final chapter digs deep into the role of analytics in customer experience management plans, scrutinizing data harvesting methods and ways to use big data to augment customer experiences. And the chapter will look at times when knowing all about your customer goes horribly wrong.

  • Market trends tell the future of predictive analytics deployments

    Predictive analytics employs statistical or machine-learning models to discover patterns and relationships in data, thereby enabling the prediction of future behavior or activity. Long used by credit card companies, predictive analytics -- and now self-service predictive analytics -- is making inroads in organizations of all sizes. Based on a survey of more than 3,000 IT and business professionals, this report analyzes their responses to provide information on implementation status, maturity of implementations, value and vendors of predictive analytics tools.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchCompliance.comView all >>

OTHER FEATURED E-HANDBOOKS