IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)White Papers (View All Report Types)
151 - 175 of 396 Matches Previous Page  | Next Page
Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Tips to develop the right retention schedule for your organization
sponsored by SearchCIO.com
WHITE PAPER: Developing record retention schedules can help companies track legal and regulatory data, ensuring that critical information is properly maintained.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

SearchCIO.com

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

The E-discovery Ostrich
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights four simple steps that will ensure your organization is ready for e-discovery. Learn what a failure to plan for an e-discovery mandate can really cost your business, and discover why a little foresight can go a long way toward peace of mind.
Posted: 25 Mar 2013 | Published: 25 Mar 2013

Iron Mountain

Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

How to Save Money and Reduce Risks in Records Management
sponsored by Iron Mountain
WHITE PAPER: As the number of digital records continues to grow, legacy records management strategies are no longer practical, causing inconsistent implementation of policies. Read this paper to learn how SharePoint technology in conjunction with an innovative collaboration tool can help to create and implement consistent, compliant records management policies.
Posted: 12 Dec 2012 | Published: 12 Dec 2012

Iron Mountain

Where is the smart money going in ICT ?
sponsored by ComputerWeekly.com
WHITE PAPER: Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment.
Posted: 29 Nov 2012 | Published: 24 Mar 2011

ComputerWeekly.com

Making Strategic Use of Tape and Cloud Technologies for Offsite Data Protection
sponsored by Iron Mountain
WHITE PAPER: This paper explains the necessary reassessment of the ways your company uses and stores data in order to create an effective storage strategy that encompasses your backup, recovery and archiving operations. Learn how to best make a new storage strategy and to explore a new idea: Optimizing off-site data with tape and cloud support.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Iron Mountain

Information governance: Reduce risk and improve compliance
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Iron Mountain

Iron Mountain Customers Share Compliance, Litigation and Discovery Best Practices
sponsored by Iron Mountain
WHITE PAPER: This paper showcases how customers of the world's largest records management consulting practice address their own compliance and discovery requirements with the help of this company's intellectual property, practical advice and best practices. Read on to access short testimonials and descriptions of the services available.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

5 Backup Features to Ensure Compliance
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

Network Security 2.0: A Systems Approach to Threat Mitigation Augments Defense in Depth
sponsored by Cisco Systems, Inc.
WHITE PAPER: In the first edition of a six part series on Network Security sponsored by Cisco Systems, security architecture is the focus. Specifically covered is a systems approach that builds on IT security investment using System Management for policy, reputation and identity.
Posted: 07 Jun 2013 | Published: 28 May 2008

Cisco Systems, Inc.

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

McAfee, Inc.

State of the Data Center Survey
sponsored by Symantec Corporation
WHITE PAPER: Examine the results from a recent survey with IT execs around the globe to uncover the latest techniques your peers are utilizing to tackle today's increasingly complex IT environments and modernize their IT strategies to effectively leverage today's emerging technologies.
Posted: 31 May 2013 | Published: 31 May 2013

Symantec Corporation

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Mitigating the Risks of IT Change
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.
Posted: 19 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.

Managing Threat in a Digital Age
sponsored by IBM
WHITE PAPER: Access this comprehensive paper about managing threats in the modern, digital age to learn why security has become a C-suite priority, and find insight into various types of threats and uncover the three biggest steps execs should take toward building "security intelligence."
Posted: 08 Mar 2013 | Published: 31 Aug 2011

IBM

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

LogRhythm, Inc.
151 - 175 of 396 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement