IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) White Papers (View All Report Types)
1 - 25 of 366 Matches Previous Page  |  Next Page
HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

The Rise of Object Storage
sponsored by IBM
WHITE PAPER: Object storage solutions can meet requirements for data protection and management that traditional external storage solutions cannot at high capacity. Discover key considerations your enterprise should include when evaluating an object storage solution and see the many use cases for object storage.
Posted: 10 Jun 2016 | Published: 30 Sep 2015

IBM

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Unified Identity Governance - A Business Overview
sponsored by Oracle Corporation
WHITE PAPER: Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.
Posted: 19 May 2016 | Published: 31 May 2015

Oracle Corporation

A Best Practice Approach to Database Backup and Recovery
sponsored by Veritas
WHITE PAPER: Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.
Posted: 19 May 2016 | Published: 19 May 2016

Veritas

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

How to Create a Culture of Compliance in IT
sponsored by Verizon
WHITE PAPER: Navigating compliance issues is no easy task – and the cost of noncompliance is high. Learn how to create a culture of compliance at your enterprise, and get tips on balancing your mobile strategy with compliance, protecting customer data, and more.
Posted: 16 May 2016 | Published: 31 Dec 2015

Verizon

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Build an Unstoppable Online Business with Breathtaking Customer Experience Built in
sponsored by Cogeco PEER 1
WHITE PAPER: This white paper highlights an end-to-end eCommerce hosting solution that satisfies demanding online buyers and compliance obligations and defends your business against the growing threat of cybercrime. Read on and discover how you can improve your customer experience with a superior online business.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

Cogeco PEER 1

Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security
sponsored by Absolute
WHITE PAPER: This white paper discusses the basic requirements of data breach notifications and highlights an endpoint protection technology that can help you develop effective risk management and compliance strategies. Read on to discover how you can ensure the security of your devices and protect your information.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

Absolute

ERP for Drilling Contractors
sponsored by IFS
WHITE PAPER: Discover how an integrated value chain as part of your ERP software can give your drilling industry organization greater visibility, control, performance, and accountability.
Posted: 10 Feb 2016 | Published: 31 Dec 2013

IFS

ERP for Asset-Intensive Industries: How Integrated EAM and Project Management Drives Value
sponsored by IFS
WHITE PAPER: In this white paper you will learn why a consistent asset records and better master data are essential components in any EAM or project management systems. Jump to page 5 to learn how these factors may help your organization to stay in compliance.
Posted: 10 Feb 2016 | Published: 30 Sep 2015

IFS

Understand the Basics of Performance-Driven Licensing
sponsored by VMTurbo
WHITE PAPER: Access this e-book to learn five common virtualization scenarios that break compliance. You'll also discover tactics currently being used in attempt to maintain compliance and how performance-driven compliance offers a solution to control workloads performance while mitigating compliance risk.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

VMTurbo

Data Privacy in the Cloud
sponsored by OpenText
WHITE PAPER: This white paper can help you navigate the complexities of international data privacy laws and cloud computing.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

OpenText

Making Sense of European Data Protection Regulations
sponsored by OpenText
WHITE PAPER: This white paper can help you make sense of current and future data protection regulations in the EU.
Posted: 30 Oct 2015 | Published: 31 Dec 2014

OpenText

Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Intel Security Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology, and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Posted: 23 Oct 2015 | Published: 20 Jul 2015

Intel Security

Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: Access this white paper that discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015

IBM

A Guide to Email Retention and UK Compliance Laws
sponsored by Barracuda Networks Inc.
WHITE PAPER: This white paper provides a guide to email retention and compliance laws in the UK. Read on to learn how you should be archiving data so that you can avoid legal complications in the future.
Posted: 14 Oct 2015 | Published: 14 Oct 2015

Barracuda Networks Inc.

How to Select the Right Asset Management Tool
sponsored by Matrix42
WHITE PAPER: This white paper provides expert tips for selecting the right software asset management (SAM) tool to effectively manage your software licenses.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

Matrix42

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software

Cloud Collaboration Ensures Compliance, Flight Safety
sponsored by Microsoft
WHITE PAPER: This case study explores how an air navigation service provider they designed a mobile cloud app for their document review process to ensure better compliance, collaboration, and flight safety.
Posted: 11 Nov 2015 | Published: 31 Mar 2015

Microsoft
1 - 25 of 366 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement