Business of Information Technology  >   Business Environment  >   Legal Environment  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Laws and Regulations
DEFINITION: Rules that order human activities and relations through systematic application of the force of politically organized society.
Laws Multimedia (View All Report Types)
76 - 91 of 91 Matches Previous Page  |  Next Page
Transform Your Financial and Operational Reporting
sponsored by Workday
VIDEO: In this video, learn about a composite reporting tool that serves as a single, secure foundation for supporting financial compliance, reducing risk and simplifying the audit process.
Posted: 11 Aug 2015 | Premiered: 11 Aug 2015


Sunbelt Exchange Archiver
sponsored by Sunbelt Software
TRIAL SOFTWARE: Improve the performance and productivity of your email archiving with Exchange Archiver while achieving legal and regulatory retention requirements. Download this 30-day trial now.
Posted: 10 Dec 2007 | Premiered: 10 Dec 2007

Sunbelt Software

Symantec Backup Exec™ System Recovery 7.0
sponsored by Symantec Corporation
PRODUCT DEMO: Recover from system loss or disaster in minutes, not hours or days. Download this free trial today; a disk-based system recovery tool for bare metal restoration to dissimilar hardware, virtual environments or in remote locations.
Posted: 14 Aug 2007 | Premiered: 01 Aug 2007

Symantec Corporation

Symantec Protection Network and Online Backup: An Executive Overview
sponsored by Symantec Corporation
PODCAST: In this podcast, Sr. Manager of Product Management, Mike Baldwin, provides an overview of the Symantec Protection Network and the Online Backup offering of the newly launched Symantec service.
Posted: 29 Feb 2008 | Premiered: Feb 19, 2008

Symantec Corporation

Test and simulate rules using WebSphere ILOG Business Rules Management System
sponsored by IBM
PRODUCT DEMO: Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Posted: 12 Dec 2010 | Premiered: 12 Dec 2010


The Lurking eDiscovery Disaster
sponsored by Workshare
VIDEOCAST: New eDiscovery rules are forcing organizations to develop policies and actions to comply with civil litigation today.
Posted: 14 Sep 2007 | Premiered: Sep 14, 2007, 09:00 EDT (13:00 GMT)


The Lurking eDiscovery Disaster 
sponsored by Workshare
PODCAST: New eDiscovery rules are forcing organizations to develop policies and actions to comply with civil litigation today.
Posted: 14 Sep 2007 | Premiered: Sep 14, 2007, 09:00 EDT (13:00 GMT)


The ROI of Database Archiving
sponsored by IBM
WEBCAST: This webcast explores how data archiving will enable you to improve the performance of mission critical applications and databases, control infrastructure costs and support sound data governance.
Posted: 03 Jun 2008 | Premiered: Jun 19, 2008, 14:00 EDT (18:00 GMT)


Tivoli Endpoint Manager: Continuous Compliance In A Distributed World
sponsored by Mainline Information Systems
WEBCAST: Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line.
Posted: 31 May 2011 | Premiered: May 26, 2011

Mainline Information Systems

Using AppManager for J2EE Operational Management
sponsored by SUSE
WEBCAST: Sign up now for AppManager in Action—a series of webinars presented by our product pros and designed specifically for our customers.
Posted: 09 Aug 2006 | Premiered: Jun 24, 2004


VigilEnt Policy Center 4.2 Trial
sponsored by SUSE
TRIAL SOFTWARE: VigilEnt™ Policy Center is the most comprehensive solution for developing, implementing and managing policies, standards and procedures from any department within your organization.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006


Webcast - Closing the Four Security Risk Gaps of Mainframe Console Access
sponsored by I/O Concepts Inc.
WEBCAST: The information presented in this webcast can help you be sure your company's commitment to security includes all levels of mainframe access.
Posted: 05 Dec 2008 | Premiered: Dec 5, 2008

I/O Concepts Inc.

Webcast: Active Directory Recovery with Windows Server 2008 R2
sponsored by Dell Software
WEBCAST: In this new Quest on-demand webcast, get a peek at the Active Directory Recycle Bin in action. Then, find out how a powerful third-party solution simplifies the entire recovery process to not only quickly and easily restore deleted objects, but to roll back attributes too.
Posted: 28 Sep 2010 | Premiered: Sep 28, 2010

Dell Software

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Welcome to Iron Mountain’s National Data Center
sponsored by Iron Mountain
WEBCAST: This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.
Posted: 27 Jan 2014 | Premiered: Jan 27, 2014

Iron Mountain

What's New in Group Policy Administrator 5.0
sponsored by SUSE
WEBCAST: Managing Group Policy Objects (GPOs) effectively is essential to increasing operational integrity and compliance with auditors.
Posted: 09 Aug 2006 | Premiered: Apr 5, 2006

76 - 91 of 91 Matches Previous Page    2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement