IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) White Papers (View All Report Types)
1 - 25 of 368 Matches Previous Page  |  Next Page
Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Unified Identity Governance - A Business Overview
sponsored by Oracle Corporation
WHITE PAPER: Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.
Posted: 19 May 2016 | Published: 31 May 2015

Oracle Corporation

A Best Practice Approach to Database Backup and Recovery
sponsored by Veritas
WHITE PAPER: Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.
Posted: 19 May 2016 | Published: 19 May 2016

Veritas

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

How to Create a Culture of Compliance in IT
sponsored by Verizon
WHITE PAPER: Navigating compliance issues is no easy task – and the cost of noncompliance is high. Learn how to create a culture of compliance at your enterprise, and get tips on balancing your mobile strategy with compliance, protecting customer data, and more.
Posted: 16 May 2016 | Published: 31 Dec 2015

Verizon

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Enterprise Data Architecture and Data Governance: Use Metadata to Get to the Starting Gate
sponsored by ERwin
WHITE PAPER: This white paper explores the challenges of bootstrapping a data governance problem and considers key methods for using metadata to establish the starting point for data governance. Discover how a collaborative metadata platform can ensure your enterprise has the right tools to simplify your data governance operations.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

ERwin

Build an Unstoppable Online Business with Breathtaking Customer Experience Built in
sponsored by PEER 1
WHITE PAPER: This white paper highlights an end-to-end eCommerce hosting solution that satisfies demanding online buyers and compliance obligations and defends your business against the growing threat of cybercrime. Read on and discover how you can improve your customer experience with a superior online business.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

PEER 1

Case Study: Financial Services Firm Implements Cloud DRaaS
sponsored by Cirrity
WHITE PAPER: This case study highlights how one financial services firm was able to prevent loss of revenue after a disaster occurred by implementing a cloud disaster recovery as a service (DRaaS) solution. Read on and discover how this DRaaS platform can enable a safer and more scalable data storage system and complete disaster recovery solution.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

Cirrity

Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security
sponsored by Absolute
WHITE PAPER: This white paper discusses the basic requirements of data breach notifications and highlights an endpoint protection technology that can help you develop effective risk management and compliance strategies. Read on to discover how you can ensure the security of your devices and protect your information.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

Absolute

ERP for Drilling Contractors
sponsored by IFS
WHITE PAPER: Discover how an integrated value chain as part of your ERP software can give your drilling industry organization greater visibility, control, performance, and accountability.
Posted: 10 Feb 2016 | Published: 31 Dec 2013

IFS

ERP for Asset-Intensive Industries: How Integrated EAM and Project Management Drives Value
sponsored by IFS
WHITE PAPER: In this white paper you will learn why a consistent asset records and better master data are essential components in any EAM or project management systems. Jump to page 5 to learn how these factors may help your organization to stay in compliance.
Posted: 10 Feb 2016 | Published: 30 Sep 2015

IFS

Understand the Basics of Performance-Driven Licensing
sponsored by VMTurbo
WHITE PAPER: Access this e-book to learn five common virtualization scenarios that break compliance. You'll also discover tactics currently being used in attempt to maintain compliance and how performance-driven compliance offers a solution to control workloads performance while mitigating compliance risk.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

VMTurbo

Special Report: The Risks of Shadow Data
sponsored by Elastica
WHITE PAPER: Based on the analysis of over 63 million documents, this report on shadow data provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Elastica

Data Privacy in the Cloud
sponsored by OpenText
WHITE PAPER: This white paper can help you navigate the complexities of international data privacy laws and cloud computing.
Posted: 03 Nov 2015 | Published: 02 Nov 2015

OpenText

Making Sense of European Data Protection Regulations
sponsored by OpenText
WHITE PAPER: This white paper can help you make sense of current and future data protection regulations in the EU.
Posted: 30 Oct 2015 | Published: 31 Dec 2014

OpenText

Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Intel Security Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology, and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Posted: 23 Oct 2015 | Published: 20 Jul 2015

Intel Security

Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: Access this white paper that discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015

IBM

How to Select the Right Asset Management Tool
sponsored by Matrix42
WHITE PAPER: This white paper provides expert tips for selecting the right software asset management (SAM) tool to effectively manage your software licenses.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

Matrix42

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software

Cloud Collaboration Ensures Compliance, Flight Safety
sponsored by Microsoft
WHITE PAPER: This case study explores how an air navigation service provider they designed a mobile cloud app for their document review process to ensure better compliance, collaboration, and flight safety.
Posted: 11 Nov 2015 | Published: 31 Mar 2015

Microsoft
1 - 25 of 368 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement