White Papers for International Standards Organization (ISO) 27002 (17799)White Papers > ISO 27002 (17799)
Listings 181 - 190 of 380:
Image Spam: The Latest Attack on the Enterprise Inbox
Over the past year global spam volumes have tripled, and Secure Computing Research has seen an increase of 50 percent in just the past six weeks. Spam now accounts for nearly 90% of all emai...
Implementing ISO 17799
As a global framework for best practices in information security, ISO 17799 has become the optimum choice for meeting the needs of regulatory compliance in many organizations. Implementing I...
Implementing ISO17799 Compliance Controls With Scriptlogic
ScriptLogics software solutions are used every day on more than 3.2 million desktops and 86,000 servers at more than 14,000 customer installations around the world. ScriptLogics software s...
Improving Communication in Emergency Situations: Mobile Business Continuity Planning Solutions
Without an effective plan in place, disruptions to business operations or government services can cause substantial financial loss, unnecessary personal or property damage, while seriously i...
Improving IT Execution
This ExecBlueprint discusses ways that IT can step into this new role and, in the process, improve its ability to execute technology solutions that will most optimally drive business growth ...
Improving Security in the Enterprise
Traditional security operations do not detect irregular activity, never change state of threat awareness and provide minimal situational awareness. This white paper demonstrates how a new br...
Incident Response Requirement under ISO 17799
White paper on Incident Response Requirement under ISO 17799
Industry complianceFriend or Foe?
Todays consumers have become less tolerant of sub-standard quality products and services. As these consumers demand more, there is almost an exponential increase in the activity supporting ...
Information Security Management: Understanding ISO 17799
A document which provides indepth information about ISO 17799. ISO 17799 is an internationally recognized Information Security Management Standard, first published by the International Orga...
Instant Messaging, VoIP, P2P, and Games in the Workplace: How to Take Back Control
IT departments have long understood the need to prevent viruses, spyware and other malicious applications or activity from compromising security and disrupting business continuity. Now th...
Copyright © 2007-2012 ComplianceHome.com. A SUPREMUS GROUP venture. All rights reserved.