IT Compliance Resources

IT Compliance news and support resources, featuring the hottest solutions, technologies and vendors in the IT Compliance world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "IT Compliance"

AWS Video: How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enhance Security on #AWS

Amazon Web Services
Retail Insights, LLC lacked sufficient visibility into their AWS environment and were relying on third party developers to build their web applications. To gain a better understanding of their security posture, they sought out a security solution that would provide total visibility into their apps and environment. Additionally, a new business opportunity arose that required […]

Google Cloud: Going Hybrid with Kubernetes on Google Cloud Platform and Nutanix

Google Cloud
Recently, we announced a strategic partnership with Nutanix to help remove friction from hybrid cloud deployments for enterprises. You can find the announcement blog post here. Hybrid cloud allows organizations to run a variety of applications either on-premise or in the public cloud. With this approach, enterprises can: Increase the speed at which they’re releasing products and features Scale applications to meet […]

US HIPAA Breach Cost Twice the Global Average per Record

A recent report developed by the Ponemon Institute concluded that the cost of Healthcare data breaches continue to remain the highest out of any industry, with the average cost being $380 per record. For all other industries, the average cost per record is $141, meaning that a breach of healthcare data costs 2.5 times more […]

Turbonomic Named to Forbes 2017 Cloud 100 List For Second Year

Turbonomic today announced that it has been named to the Forbes 2017 Cloud 100 list for the second consecutive year. The Forbes 2017 Cloud 100 is the definitive list of the top 100 private cloud companies in the world, published by Forbes in collaboration with Bessemer Venture Partners and Salesforce Ventures. The global data-driven list is evaluated by a panel of judges, which […]

Microsoft: Analyze your Check Point logs with OMS Security

The Security & Compliance solution in the Operations Management Suite (OMS) provides security insights about many sources of security data from Windows and Linux machines, including any source that emits Syslog. Today, we are announcing a new capability, developed by Check Point, that enables you to send Check Point security gateway logs to the OMS […]

Citrix: Department of Defense Approves Citrix NetScaler for its Unified Capabilities Approved Products List

Citrix Systems
Without question, security is top-of-mind within every federal agency and IT solutions are required to meet stringent security requirements before they can even be considered for implementation. The Department of Defense Information Network Approved Product Listing (DoDIN APL) represents the DoD’s master list of secure, trusted, and approved technology infrastructure products. The DoDIN APL was […]

Secure By Default – VM.disable-unexposed-features

We would like to post one very important article from Mike Foley, Senior Technical Marketing Architect at VMware about “Secure by default”. I’m super happy to announce that we are showing more progress in our quest for “Secure By Default” for ESXi and vCenter Server. This latest update is one that is near and dear […]

Cisco: Start Your Privacy Protection Planning Now

One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries from 25th May 2018. […]

Managing Security with AWS – #AWS Session Video

Amazon Web Services
Customers using AWS benefit from over 1,800 security and compliance controls built into the AWS platform and operations. In this session, you will learn how to take advantage of the advanced security features of the AWS platform to gain the visibility, agility, and control needed to be more secure in the cloud than in legacy […]

VMware AirWatch Windows 10 Unified Endpoint Management Reviewer’s Guide

The VMware AirWatch® 9.1 Enterprise Mobility Management™ capabilities for Windows 10 introduce smarter ways to deploy, control, and manage an organization’s PC fleet. Traditional approaches use multiple administrative tools to manage the PC life cycle. In contrast, VMware AirWatch unifies enterprise mobility management in a single admin console. The VMware AirWatch simplified approach to PC […]

Microsoft: DSCEA has been released – Introducing exciting new updates to Start-DSCEAscan

DSCEA has been released!!! Just as a recap on DSCEA: DSC Environment Analyzer (DSCEA), is an open source PowerShell module that uses the declarative nature of Desired State Configuration to scan systems in an environment against a defined reference MOF file and generate compliance reports as to whether systems match the desired configuration. DSCEA […]

RIoT Control: Understanding and Managing Risks and the Internet of Things

IT Books
RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, […]

Introducing the Raspberry Pi Integrator Programme

An ever-growing number of companies take advantage of Raspberry Pi technology and use our boards as part of their end products. Raspberry Pis are now essential components of everything from washing machines to underwater exploration vehicles. We love seeing these commercial applications, and are committed to helping bring Raspberry Pi-powered products to market. With this […]

Automate Preservation/Retention for OneDrive for Business sites using Office 365 Compliance Center PowerShell

I worked on a small project a few months back where we had to automate retention/preservation for OneDrive for Business sites in Office 365. Here is what the high level requirements were for the automation: An attribute of the user object in the On-premise Active Directory will determine whether the user’s OneDrive site should be […]

Visit Our Sponsors