IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)White Papers (View All Report Types)
151 - 175 of 415 Matches Previous Page  | Next Page
Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Identify and Destroy: Your Two-Step Ticket to Easier Information Compliance
sponsored by Iron Mountain
WHITE PAPER: This brief white paper provides a two-step ticket to easier information compliance. Discover three steps to speed and recovery and how to identify and destroy data that is no longer relevant to your business needs.
Posted: 30 Aug 2013 | Published: 16 Jun 2013

Iron Mountain

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

How Can I Address Identity and Access Governance Within My Organization to Reduce Risks?
sponsored by CA Technologies.
WHITE PAPER: Gain insight into an identity and access governance that combines an integrated lifecycle approach with process automation and powerful analytics to provide insurmountable security and cost-efficiency.
Posted: 23 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Tips to develop the right retention schedule for your organization
sponsored by SearchCIO.com
WHITE PAPER: Developing record retention schedules can help companies track legal and regulatory data, ensuring that critical information is properly maintained.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

SearchCIO.com

Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the risks associated with privileged accounts and details how a privileged management tool helps reduce risk, improve compliance, and – above all – boost security and protect your organization from insider threats.
Posted: 18 Jul 2013 | Published: 31 Jan 2013

CA Technologies.

How Data Protection Management Can Overcome Backup Challenges
sponsored by APTARE
WHITE PAPER: This white paper explores seven of today's major compliance challenges and highlights how one data protection solution can help organizations address them.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Consolidated Management: Resolve, Report and Prevent Backup Failures
sponsored by APTARE
WHITE PAPER: This short white paper provides insight into tips for effective prevention, reporting and resolution of backup failures.
Posted: 03 Jul 2013 | Published: 28 Jun 2013

APTARE

Using a Gateway to achieve PCI compliance
sponsored by Forum Systems
WHITE PAPER: This exclusive resource examines a gateway product that can help your organization achieve PCI compliance.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

Forum Systems

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER: In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Posted: 16 Oct 2013 | Published: 31 Dec 2009

Lumension

Industry Credentials Insurance
sponsored by Azzurri
WHITE PAPER: These top case studies highlight three UK insurance providers and their networking challenges with enhancing customer experience and increasing customer loyalty through better communication and end-user engagement, and how they found a solution that streamlined contact management and more.
Posted: 02 Oct 2013 | Published: 02 Oct 2013

Azzurri

Rethinking Your Enterprise Security
sponsored by Hewlett-Packard Company
WHITE PAPER: If you stop to ask yourself how your security strategy is doing, more likely than not you'd say it's going fine, right? This resource is a prime opportunity to conduct a personal security report card to double check that all of your security i's are dotted and t's crossed.
Posted: 30 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett-Packard Company
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett-Packard Company

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

Computer Weekly special report: Mobile device management and the importance of absolute compliance
sponsored by BlackBerry
WHITE PAPER: Ensuring regulatory compliance can be difficult when dealing with an influx of mobile devices, but it's still critical. Learn how to create a bring-your-own-device, or BYOD, policy that will keep your organisation completely compliant.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

BlackBerry

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Three principles to Improve Data Security and Compliance
sponsored by IBM
WHITE PAPER: In this exclusive white paper, discover three key guiding principles that can help improve data security and compliance. Read on and also learn about how you can ensure that your private data remains private.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Governance and Control of Privileged Identities to Reduce Risk
sponsored by CA Technologies.
WHITE PAPER: This resource outlines the top risks of governing privileged identities and shared accounts and details how an automated governance of privileged identities can help you overcome them. View now to learn more!
Posted: 22 Jul 2013 | Published: 28 Feb 2013

CA Technologies.

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.
151 - 175 of 415 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement