Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Compliance (Law)

RSS Feed    Add to Google    Add to My Yahoo!
Compliance (Law) Multimedia (View All Report Types)
 
Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP
sponsored by Hewlett-Packard Limited
VIDEO: This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets.
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

The Future of the Contact Center: 7 Key Trends in 2015
sponsored by Five9
WEBCAST: In this webcast, Liz Osborn, VP of Product and Solution Marketing at Five9, discusses 7 key trends that are shaping the future of the contact center, from social engagement to OmniChannel capabilities. Watch now to access useful advice on maximizing the benefits of these trends within your organization.
Posted: 04 Jun 2015 | Premiered: Apr 2, 2015

Five9

Data Protection for Virtual Environments Webcast
sponsored by Quantum Corporation
WEBCAST: In this webcast, Greg Schulz, Founder and Senior Analyst at The StorageIO Group, and Randy Glissman, Solutions Marketing Manager at Quantum, explore solutions for virtual server data protection and discuss general data center trends and perspectives.
Posted: 22 Sep 2009 | Premiered: Sep 21, 2009

Quantum Corporation

Tivoli Endpoint Manager: Continuous Compliance In A Distributed World
sponsored by Mainline Information Systems
WEBCAST: Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line.
Posted: 31 May 2011 | Premiered: May 26, 2011

Mainline Information Systems

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Symantec Backup Exec™ System Recovery 7.0
sponsored by Symantec Corporation
PRODUCT DEMO: Recover from system loss or disaster in minutes, not hours or days. Download this free trial today; a disk-based system recovery tool for bare metal restoration to dissimilar hardware, virtual environments or in remote locations.
Posted: 14 Aug 2007 | Premiered: 01 Aug 2007

Symantec Corporation

Email Archiving in Exchange 2010: Are Third-Party Solutions Still Necessary?
sponsored by Proofpoint, Inc.
WEBCAST: With the introduction of basic email retention and discovery features in Exchange 2010, some organizations are delaying or canceling the deployment of third-party email archiving solutions. But can Exchange adequately address these three critical business issues? And what about organizations that aren't planning to upgrade anytime soon?
Posted: 16 Feb 2010 | Premiered: Feb 16, 2010

Proofpoint, Inc.

Data Protection for Virtual Environments
sponsored by Quantum Corporation
WEBCAST: Please join this webcast as Randy Glissmann, Solutions Marketing Manager, Quantum, explains Quantum solutions for virtual server data protection. Greg Schulz, Founder and Sr. Analyst – The StorageIO Group and author of "Resilient Storage Networks" and "The Green and Virtual Data Center," will also be speaking.
Posted: 20 Aug 2009 | Premiered: Sep 26, 2008

Quantum Corporation

Best Practices for Database Security and Compliance
sponsored by Guardium, an IBM Company
WEBCAST: Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)

Guardium, an IBM Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement