Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Multimedia (View All Report Types)
1 - 25 of 56 Matches Previous Page  |  Next Page
PDF Security in Seconds
sponsored by Nuance
VIDEO: In today's business world, redacting information in sensitive documents can consume valuable time and money. This brief video explores how to make your documents, as well as entire folders, more secure in seconds with agile search capabilities. Tune in now and be well on your way to more compliant collaborations.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

Case Study: Document Conversion in the Law Offices of Gersten Savage, LLP
sponsored by Nuance
VIDEO: This brief video features a case study about a law office's deployment of document conversion tools. Discover how the right strategy will save you money and time, in addition to making everyone's life easier.
Posted: 14 May 2015 | Premiered: 20 Nov 2013

Nuance

Maximizing the Efficiency of a Loan's Lifecycle
sponsored by Nuance
VIDEO: Manual, paper-based loan processes expose banks to longer delays, errors, and customer attrition. This featured video lays out concerns and strategies to leverage financial institutions' most critical process. Discover the benefits of expediting loans with collaborative technologies.
Posted: 13 May 2015 | Premiered: 23 Mar 2015

Nuance

Endpoint Security Benefits from Web-Based Platforms
sponsored by Absolute Software
WEBCAST: This brief webcasts highlights which features to look for in endpoint security technology. Tune in, and assess whether or not your current strategy has the following capabilities.
Posted: 07 May 2015 | Premiered: May 7, 2015

Absolute Software

CSI Techniques for IT Security
sponsored by Absolute Software
WEBCAST: This webinar illustrates the importance of staying ahead of the curve. Join Lance Mueller, Magnet Forensics' own Director of Forensics, to learn why you should proactively monitor for early signs of an IT security incident.
Posted: 07 May 2015 | Premiered: Jan 3, 2014

Absolute Software

Protect Your Data While Increasing End-User Productivity
sponsored by Absolute Software
WEBCAST: The District of Columbia National Guard (DCNG) once struggled to run inventories on devices and protect against data breaches. Tune in to the following webinar and learn how DCNG was able to improve inventory accountability and save resources.
Posted: 07 May 2015 | Premiered: Apr 8, 2014

Absolute Software

Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST: This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014

Absolute Software

Data Security: Preparing for the Compliance Landscape of Tomorrow
sponsored by Absolute Software
WEBCAST: Data security and data protection laws, such as the proposed change in the EU, promise to completely revolutionize the compliance landscape for many organizations. The following webinar is designed to prepare CISOs and IT professionals today, to manage tomorrow's compliance landscape.
Posted: 07 May 2015 | Premiered: Nov 18, 2014

Absolute Software

Turning Compliance into an Opportunity
sponsored by Hewlett-Packard Limited
VIDEO: Take a look at this video to discover how you can make compliance more efficient and turn regulations into helps instead of hindrances.
Posted: 09 Apr 2015 | Premiered: 09 Apr 2015

Hewlett-Packard Limited

Dealing with Today’s Data Minefield and GRC Challenges
sponsored by Modulo
PODCAST: This podcast delves into the GRC challenges security officers are facing today and actions to overcome them.
Posted: 06 Apr 2015 | Premiered: Mar 11, 2015

Modulo

Automating GRC to Maximize Physical Security ROI
sponsored by Modulo
WEBCAST: This webcast teaches you how to integrate physical security risk management into your automated GRC strategy. View now to uncover how to improve data protection and the several other benefits that await.
Posted: 03 Apr 2015 | Premiered: Mar 4, 2015

Modulo

Automating IT Risk Management
sponsored by Modulo
WEBCAST: This webcast shows you how to reduce GRC complexity and cost through automation.  View now to learn more.
Posted: 03 Apr 2015 | Premiered: Mar 25, 2015

Modulo

Developing a GRC Framework to Enable Automation
sponsored by Modulo
WEBCAST: This webcast examines how bank automated GRC processes to execute risk and compliance assessments. View now to learn how to develop a GRC framework and use autoamtion to facilitate new functions required within GRC.
Posted: 03 Apr 2015 | Premiered: Oct 22, 2014

Modulo

How smart companies are automating their report assembly processes
sponsored by IBM
VIDEO: This webcast identifies key strategies and capabilities for effective multi-author, recurring narrative reporting and disclosure management.
Posted: 11 Feb 2015 | Premiered: 11 Feb 2015

IBM

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

Risk Assessment Redo: Trends that make you rethink info governance strategy
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: New data protection vulnerabilities have forced organizations to reexamine risk management strategy. In this classroom, learn how to adapt your risk assessment and information management strategies to face modern threats.
Posted: 08 Dec 2014 | Premiered: 05 Dec 2014

SearchCompliance.com

The Increasing Value of Data in Australia: Privacy, Security and Compliance
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: Access this video to learn how 150 other organizations are evolving in terms of data management. You'll also learn about new technologies as well as areas where organizations are still frequently exposed to risks.
Posted: 01 Oct 2014 | Premiered: 03 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Examine the Increasing Value of Data
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: In this video, Julian Badell from NTT ICT and Andrew McGee from Hitachi Data Systems have been interviewed by Sky News Business on the responsibilities of data custodianship and how organizations are handling this new currency. View now to learn how new privacy laws are changing the way organizations handle their data.
Posted: 30 Sep 2014 | Premiered: 14 Sep 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Case Study: ING Streamlines Storage, Communications with Symantec
sponsored by Symantec Corporation
WEBCAST: Learn how Symantec helped ING Investment Management with email and document archiving, e-discovery, and compliance.
Posted: 16 Sep 2014 | Premiered: Aug 27, 2014

Symantec Corporation

Case Study: ING Streamlines Storage, Communications with Symantec
sponsored by Symantec Corporation
WEBCAST: Learn how Symantec helped ING Investment Management with email and document archiving, e-discovery, and compliance.
Posted: 27 Aug 2014 | Premiered: Aug 27, 2014

Symantec Corporation

PST Archiving: Your Employees' Dirty Little Secret
sponsored by Commvault
WEBCAST: This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files.
Posted: 06 Mar 2014 | Premiered: Jan 23, 2014

Commvault

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Best practices in managing requirements in Energy and Utilities industries
sponsored by IBM
WEBCAST: This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Posted: 27 Mar 2014 | Premiered: May 31, 2013

IBM
1 - 25 of 56 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement