IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) White Papers (View All Report Types)
151 - 175 of 369 Matches Previous Page  |  Next Page
Where is the smart money going in ICT ?
sponsored by ComputerWeekly.com
WHITE PAPER: Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment.
Posted: 29 Nov 2012 | Published: 24 Mar 2011

ComputerWeekly.com

Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report
sponsored by ComputerWeekly.com
WHITE PAPER: This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy, G-Cloud & Government Applications Store Programme Phase 2
sponsored by ComputerWeekly.com
WHITE PAPER: At the core of the programme is the vision of providing political, business and ICT leaders with greatly improved agility, flexibility and choice in the ICT that enables the public sector and to deliver substantial cost savings on both existing and new ICT services.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

IT Jobswatch - Financial Services
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by software houses and consultancies is up by 8.1%. The growth in demand for IT staff in this sector shows 27.3% more vacancies being advertised than a year ago.
Posted: 21 Oct 2011 | Published: 11 Feb 2011

ComputerWeekly.com

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

LogRhythm, Inc.

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
sponsored by Dell Software
WHITE PAPER: This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities.
Posted: 23 Jul 2012 | Published: 31 Dec 2011

Dell Software

Making Office 365 More Secure and Compliant
sponsored by Dell Software
WHITE PAPER: This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Dell Software

Manage Data Growth
sponsored by Dell, Inc.
WHITE PAPER: If you're one of the many IT admins struggling to stay afloat in this data flood, check out this two-page white paper to learn how to get your data future-ready, how to improve your forecasting and how to align the relative business value of your data with a suitable storage cost.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Bluelock Virtual Datacenters Instrumental in Patronpath’s PCI-DSS Compliance in the Cloud
sponsored by Bluelock
WHITE PAPER: One of the biggest challenges and concerns of businesses moving to the cloud is ensuring regulatory compliance and security. Discover how Patronpath, a company that processes and handles online credit card transactions for customers, increased scalability and decreased costs by adopting PCI-compliant cloud services.
Posted: 14 May 2012 | Published: 02 May 2012

Bluelock

7 Tips for Achieving Active Directory Compliance
sponsored by Dell Software
WHITE PAPER: Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Dell Software

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA
WHITE PAPER: This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA

The Role of Governance, Risk Management & Compliance in Organizations
sponsored by RSA
WHITE PAPER: Meeting enterprise Governance, Risk and Compliance (eGRC) objective is very challenging in today’s IT world. This white paper outlines the results of a study that surveyed 190 individuals from one of the largest eGRC practitioner communities.
Posted: 27 Mar 2012 | Published: 02 May 2011

RSA

Oracle Database 11g Release 2 High Availability
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 12 Mar 2012 | Published: 31 Oct 2010

Oracle Corporation

Kahuna Ventures Eliminates Email PST Files and Improves Data Retention and Recovery with Metalogix
sponsored by Metalogix
WHITE PAPER: Discover how a company reduced its email volume by 50 percent and enabled faster backups and recovery with an email archiving solution. Explore the advantages of implementing this archiving system, including the ability to eliminate management of burdensome PST files and comprehensive legal retention features.
Posted: 16 Feb 2012 | Published: 16 Feb 2012

Metalogix

Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

IBM

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK
sponsored by Idera
WHITE PAPER: This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Idera

Cloud Computing: Get to know the basics
sponsored by Red Hat
WHITE PAPER: This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
Posted: 23 Jan 2012 | Published: 05 Jan 2012

Red Hat

Top 10 reasons to strengthen information security with desktop virtualization
sponsored by Citrix and Microsoft
WHITE PAPER: Sophisticated threats, device proliferation and a growing burden of compliance and data privacy requirements are changing the information security landscape. Find out why Citrix desktop virtualization should be the foundation of your security strategy.
Posted: 19 Jan 2012 | Published: 19 Jan 2012

Citrix and Microsoft

Managing Big Data Using Sybase IQ VLDB Option
sponsored by Sybase, an SAP company
WHITE PAPER: This brief white paper outlines information lifecycle management (ILM), a set of strategies for managing the growth, storage and retrieval of information over its useful life. Its goal is to ensure that frequently accessed data is returned as fast as possible, while controlling storage costs.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

Sybase, an SAP company

Best Practices for Oracle Licence Management
sponsored by Flexera Software
WHITE PAPER: In this white paper you will learn five reasons why your Oracle licensing requirements may evolve, the five best practices for Oracle license management and more.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Flexera Software

Security in Cloud Computing
sponsored by Intel
WHITE PAPER: New and improved technologies can improve cloud security and smooth the transition in your enterprise. Access this white paper to learn how these solutions can allow your business to take advantage of all the cloud has to offer while maintaining a secure infrastructure.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

Intel
151 - 175 of 369 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement