IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Multimedia (View All Report Types)
26 - 50 of 74 Matches Previous Page  | Next Page
Software Asset Management Webinar
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

The Inevitable Threat to Your Share Price
sponsored by Hewlett-Packard Limited
WEBCAST: This webcast highlights the criticality of investing in security upfront to prevent data breaches, instead of merely focusing on the clean-up process. View now to see how this could save IT costs, and brand reputation, in the long-run.
Posted: 05 Feb 2014 | Premiered: Feb 5, 2014

Hewlett-Packard Limited

Information Governance Symposium 2013: Does Big Data=Big Headaches?
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this three-part web seminar taped at the ARMA International Conference, Consult IG owner Brent Gatewood explains how big data is changing information governance, and how businesses need to adapt records management processes to accommodate these changes.
Posted: 17 Dec 2013 | Premiered: 17 Dec 2013

SearchCompliance.com

IBM Platform Computing Maximizes CME Group's Computation Power and Performance
sponsored by IBM
VIDEO: This video case study details the solution one company went with to increase their data center power while maintaining compliance.
Posted: 26 Nov 2013 | Premiered: 20 Aug 2013

IBM

Network Visibility Primer
sponsored by Ixia
WEBCAST: Access this brief webcast to discover an improved visibility solution that will help reduce network complexity, as well as offer dynamic filtering under a simplified architecture.
Posted: 25 Oct 2013 | Premiered: Oct 25, 2013

Ixia

Information Governance Symposium: Information Governance Best Practices
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.
Posted: 24 Oct 2013 | Premiered: 05 Nov 2013

SearchCompliance.com

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 05 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

SharePoint® and E-Discovery Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, uncover how and what you need to preserve from your SharePoint environment for efficient recovery and litigation readiness. Learning objectives include understanding why SharePoint data archiving should be part of litigation readiness planning, how to reduce e-discovery risk, how to minimize recovery times and more.
Posted: 09 Jul 2013 | Premiered: 09 Jul 2013

SearchCompliance.com

Recordkeeping Needs Assessment Case Study: Using the Cloud to Improve Dismal Scores
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom explores the methodology used to conduct an early Generally Accepted Recordkeeping Principles® needs assessment (N.A.), followed by a discussion of how the N.A. led to the selection of a Cloud provider to improve dismal scores.
Posted: 02 Apr 2013 | Premiered: 02 Apr 2013


Building A Powerful IM Strategy for Large Organizations
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: Large organizations face challenges in identifying and defining requirements for the implementation of information management strategies. This classroom will lead you through Enbridge Inc.'s journey - from understanding business risks and gaining executive support, to elaborating, staffing, and implementing measureable execution techniques.
Posted: 01 Apr 2013 | Premiered: 02 Apr 2013


Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

Economic & Productivity Impact of IT Security on Healthcare - Video
sponsored by Imprivata
WEBCAST: View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.
Posted: 08 Nov 2013 | Premiered: May 8, 2013

Imprivata

PCI DSS Simplified: What You Need to Know
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.
Posted: 14 Oct 2013 | Premiered: Oct 14, 2013

AlienVault

Netwrix Auditor Enterprise Edition
sponsored by Netwrix Corporation
TRIAL SOFTWARE: When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Netwrix Corporation

File Archive: the next big thing?
sponsored by EMC Corporation
VIDEO: Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.
Posted: 08 Oct 2013 | Premiered: 08 Oct 2013

EMC Corporation

Security University: GRC Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: GRC is essential to all businesses. But considering its importance and breadth, coupled with the transformative nature of compliance regulations, GRC management can be daunting. This classroom will explore: GRC solutions for various stages; Questions to ask when considering a purchase; Vendor insights on achieving comprehensive GRC plans
Posted: 27 Sep 2013 | Premiered: 05 Jul 2013

SearchCompliance.com

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 03 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

A Proactive Approach to Compliance, Security and Audit
sponsored by IBM
WEBCAST: This exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure.
Posted: 31 Jul 2013 | Premiered: Jul 31, 2013

IBM

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AlienVault
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AlienVault

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com
26 - 50 of 74 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement