Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FDA 21 CFR 11

RSS Feed    Add to Google    Add to My Yahoo!
FDA 21 CFR 11Multimedia (View All Report Types)
 
Six Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, we cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

Can the CIO dilemma be solved?
sponsored by IBM
PODCAST: Many companies are benefiting from a smarter approach to infrastructure and architecture.Access this podcast aimed at IT decision makers who are using technology to transform their organizations and improve business performance. Find out how you can turn your company into a smarter organization and make your IT become more strategic.
Posted: 18 Mar 2013 | Premiered: Mar 18, 2013

IBM

IT Priorities - Automated Deployment
sponsored by Interwoven, Inc.
WEBCAST: For IT groups, the ability to bring revenue generating applications to market faster is a top priority. Learn how automated deployment of your enterprise applications can ensure accuracy, establish compliance controls and reduce provisioning costs.
Posted: 18 Sep 2006 | Premiered: Sep 18, 2006

Interwoven, Inc.

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

Podcast: Automating Access Certification in Just 17 Days
sponsored by Aveksa
PODCAST: This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program.
Posted: 10 Aug 2012 | Premiered: Aug 10, 2012

Aveksa

Six Best Practices to Prevent Enterprise Data Loss
sponsored by RSA, The Security Division of EMC
VIDEO: Join Tom Corn, Vice President of Data Security Products at RSA, The Security Division of EMC as he discusses six best practices for preventing enterprise data loss. Hear how these best practices enable you to protect your critical data throughout its lifecycle -- no matter where it moves, who accesses it or how it is used.
Posted: 05 Feb 2009 | Premiered: 05 Feb 2009

RSA, The Security Division of EMC

IBM Information Lifecycle Management in Regulated Industries
sponsored by IBM
WEBCAST: Attend this Webcast, and listen as IDC's Research Director, Laura DuBois, discusses the issues around identifying and classifying information.
Posted: 18 Oct 2006 | Premiered: Nov 1, 2006, 13:00 EST (18:00 GMT)

IBM

Efficient SAN Based Tape Encryption with Curtis Preston
sponsored by Cisco Systems, Inc.
WEBCAST: Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)

Cisco Systems, Inc.

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

RTDiscover
sponsored by FaceTime Communications
PRODUCT DEMO: The Internet has changed. Email and Web browsing traffic entering enterprise networks is now dwarfed by greynets like IM, VoIP and P2P, opening channels for potential malware coming in, as well as the danger of sensitive information leaking out
Posted: 10 Dec 2007 | Premiered: 10 Dec 2007

FaceTime Communications
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement