IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)White Papers (View All Report Types)
1 - 25 of 389 Matches Previous Page  | Next Page
Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, explore several best practises that should be implemented to support workforce mobility.
Posted: 24 Jul 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even with mobile devices. Read on to learn about the government's relationship with healthcare providers, as well as insight for securing devices to protect sensitive data.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

Evaluating Cloud-Based Archiving for Compliance
sponsored by HP Autonomy
WHITE PAPER: This expert e-guide will teach you how to handle cloud-based archiving and compliance concerns
Posted: 24 Jul 2014 | Published: 24 Jul 2014

HP Autonomy

Automate, Monitor, and Improve Your Compliance Procedures
sponsored by Interneer, Inc.
WHITE PAPER: This white paper explores the benefits of automating compliance procedures. It also highlights a solution that delivers this automation as well as monitoring capabilities.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

Interneer, Inc.

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains how a GRC platform can transform how an organization operates – internally, externally and legally. It explains how a suitable platform enables better, faster decision making, creating a more competitive organization.
Posted: 15 Jul 2014 | Published: 17 Apr 2014

CommVault Systems, Inc.

Providing a single source for secure identity solutions
sponsored by HID
WHITE PAPER: Access this white paper to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012

HID

Tackling the CFO Innovation Challenge
sponsored by Perceptive Software
WHITE PAPER: Find out how CFO's are providing innovative solutions while focusing on best in class operational excellence.
Posted: 10 Jul 2014 | Published: 31 Jul 2013

Perceptive Software

Enterprise Universal Access One secure credential for logical, physical, local and remote access
sponsored by HID
WHITE PAPER: This white paper explores leading solutions designed to create successful enterprise authentication.
Posted: 09 Jul 2014 | Published: 19 Sep 2013

HID

The Apple-ization of the Enterprise: Understanding IT’s New World
sponsored by Code42
WHITE PAPER: Access this white paper to learn about a new set of tools and applications that can help you keep your end-users happy while also satisfying the demands of senior management and auditors. It's time to stop fighting the "Apple-ization of the Enterprise" and start enjoying the benefits that this trend can deliver.
Posted: 08 Jul 2014 | Published: 07 Jul 2014

Code42

Enterprise Mobility: A Checklist for Secure Containerization
sponsored by Code42
WHITE PAPER: Containerization is a security method that separates enterprise applications and data from personal applications and data. This white paper explains the pros and cons of various approaches to containerization.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Posted: 07 Jul 2014 | Published: 28 Feb 2011

Veracode, Inc.

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

3-Phase Clinical Content Archive Strategy
sponsored by Perceptive Software
WHITE PAPER: This white paper explains how the "Walk-Run-Fly" strategy can help healthcare organizations use VNA to effectively manage content.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Perceptive Software

Protecting Digitalized Assets in Healthcare: Which Managed File Transfer Deployment Model is Right for You?
sponsored by GlobalScape
WHITE PAPER: Learn what types of policies and tools can be implemented to secure valuable healthcare data.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of a backup solution built to handle the requirements of volume, mobility and compliance in a more streamlined and cost-effective way.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Code42

Data Security Checklist: Tips for Managing the Mobile Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This document presents a checklist of data security features to consider when establishing an enterprise mobility management strategy.
Posted: 01 Jul 2014 | Published: 30 Nov 2013

Accellion, Inc.

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

What to Look For In a Backup Solution to Deliver Improved Business Continuity
sponsored by Datto, Inc.
WHITE PAPER: This expert guide provides advice on how organizations can find a backup solution that can improve business continuity capabilities and prevent against data loss.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Datto, Inc.

The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Top 10 Review: Voltage SecureMail Cloud Standard
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper highlights a secure email platform that scored 10/10 in reviews on recipient experience and administration tools
Posted: 17 Jun 2014 | Published: 31 Dec 2013

Voltage Security, Inc.

Why Investing in Specialty Healthcare Applications Enables Clinical Workflow Improvements
sponsored by GE
WHITE PAPER: This resource offers 5 FAQs on how specialty applications can add value to healthcare workflows in an age where EMRs can leave potential gaps in clinician delivery, documentation, finances, and compliance.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

GE

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.
1 - 25 of 389 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement