IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) White Papers (View All Report Types)
151 - 175 of 347 Matches Previous Page  |  Next Page
Data Centre Migration, G-Cloud & Applications Store Programme Phase 2 – Technical Architecture Workstrand Report
sponsored by ComputerWeekly.com
WHITE PAPER: This technical architecture provides a common foundation of software and hardware infrastructure principles for multiple business applications. The technical architecture provides the framework for interfaces, protocols, standards and products to be used in defining a platform that supports applications across UK public sector organisations.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy, G-Cloud & Government Applications Store Programme Phase 2
sponsored by ComputerWeekly.com
WHITE PAPER: At the core of the programme is the vision of providing political, business and ICT leaders with greatly improved agility, flexibility and choice in the ICT that enables the public sector and to deliver substantial cost savings on both existing and new ICT services.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

IT Jobswatch - Financial Services
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by software houses and consultancies is up by 8.1%. The growth in demand for IT staff in this sector shows 27.3% more vacancies being advertised than a year ago.
Posted: 21 Oct 2011 | Published: 11 Feb 2011

ComputerWeekly.com

CW+: Bloor Research - EU Compliance and Regulations for the IT Professional
sponsored by ComputerWeekly.com
WHITE PAPER: This paper highlights key directives and legislation within the European Union that have an impact on IT security practitioners, especially those responsible for the safe storage of data using data loss prevention technologies.
Posted: 20 Oct 2011 | Published: 06 Jan 2011

ComputerWeekly.com

How to tackle IT audit and compliance
sponsored by ComputerWeekly.com
WHITE PAPER: IT audit is about the formal verification and validation of the quality and effectiveness of ITcontrols to support the overall business control objectives. From a security controlperspective the residual IT security risks are relatively well understood in a networkperimeter protected environment.
Posted: 20 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Top 10 reasons to strengthen information security with desktop virtualization
sponsored by Citrix and Microsoft
WHITE PAPER: Sophisticated threats, device proliferation and a growing burden of compliance and data privacy requirements are changing the information security landscape. Find out why Citrix desktop virtualization should be the foundation of your security strategy.
Posted: 19 Jan 2012 | Published: 19 Jan 2012

Citrix and Microsoft

Managing Big Data Using Sybase IQ VLDB Option
sponsored by Sybase, an SAP company
WHITE PAPER: This brief white paper outlines information lifecycle management (ILM), a set of strategies for managing the growth, storage and retrieval of information over its useful life. Its goal is to ensure that frequently accessed data is returned as fast as possible, while controlling storage costs.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

Sybase, an SAP company

Best Practices for Oracle Licence Management
sponsored by Flexera Software
WHITE PAPER: In this white paper you will learn five reasons why your Oracle licensing requirements may evolve, the five best practices for Oracle license management and more.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Flexera Software

Security in Cloud Computing
sponsored by Intel
WHITE PAPER: New and improved technologies can improve cloud security and smooth the transition in your enterprise. Access this white paper to learn how these solutions can allow your business to take advantage of all the cloud has to offer while maintaining a secure infrastructure.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

Intel

Information Retention and eDiscovery Survey
sponsored by Symantec Corporation
WHITE PAPER: This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.
Posted: 18 Oct 2011 | Published: 17 Oct 2011

Symantec Corporation

Align policy, processes and people for efficient tax and finance operations
sponsored by IBM
WHITE PAPER: Learn how to leverage advanced case management to apply analytics to detect fraud and support investigations.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

IBM

How Archiving Reduces the Cost and Complexity of "Reactive" eDiscovery
sponsored by Symantec Corporation
WHITE PAPER: This paper attempts to identify and clarify the benefits an archive can provide in the initial phases of the electronic discovery process and look at some of the features companies should look for to ensure those benefits are maximized.
Posted: 08 Sep 2011 | Published: 08 Sep 2011

Symantec Corporation

Get The Most Out of Microsoft SharePoint: Capture, Access, Govern
sponsored by EMC Corporation
WHITE PAPER: How can you get the most from your SharePoint environment? Read this guide and learn how enterprise infrastructure technologies from EMC and Microsoft help you benefit from the information contained within your Microsoft SharePoint platform.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

EMC Corporation

Networking Compliance
sponsored by Dell, Inc.
WHITE PAPER: This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

Dell, Inc.

Intel Cloud Builders Guide: Cloud Design and Development on Intel Platforms Trusted Computer Pools with Parellels
sponsored by Intel
WHITE PAPER: This white paper describes six key aspects of security and offers advice for addressing them in your cloud strategy.
Posted: 23 Aug 2011 | Published: 22 Aug 2011

Intel

Client Case Study: Bouyges Telecom
sponsored by IBM
WHITE PAPER: In this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

Client Case Study: London Borough of Brent
sponsored by IBM
WHITE PAPER: This paper discusses how Brent used IBM to supply the customer data integration and master data management (MDM) to consolidate back-end systems to reduce administration costs, improve customer service and minimise benefit fraud.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

How Master Data Management Serves the Business
sponsored by IBM
WHITE PAPER: This white paper explores the three major approaches that leading organizations use to put master data to work for the business and learn how to leverage a single view of your enterprise to reduce costs, increase agility and support compliance.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS)
sponsored by IBM
WHITE PAPER: This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

IBM

Controlling Risk Through Software Code Governance
sponsored by Coverity by Synopsys
WHITE PAPER: Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

Coverity by Synopsys

5 Mistakes Auditing Virtual Environments (You Don't Want to Make)
sponsored by HyTrust
WHITE PAPER: Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process.
Posted: 21 Jul 2011 | Published: 21 Jul 2011

HyTrust

Maintaining Continuous Compliance – a new best practice approach
sponsored by IBM
WHITE PAPER: When trying to achieve continuous compliance with internal policies and external regulations, organizations need to replace traditional processes with a new best practice approach and new innovative technology, such as that provided by IBM Tivoli Endpoint Manager.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: In the following white paper, you'll find the information you need to spearhead your patch automation initiatives. Read now and discover a fresh approach to patch management that deploys patches organization-wide in hours.
Posted: 01 Jul 2011 | Published: 01 Jul 2011

IBM

Time Value of Data
sponsored by SGI
WHITE PAPER: All of the printed material on earth is estimated to be about 200 petabytes (200,000 terabytes) of data. That is a lot of information and a lot of data to manage. But it is dwarfed by the amount of data that is generated worldwide with information technology today. Read this white paper to learn more about how to survive the information explosion.
Posted: 13 Jun 2011 | Published: 13 Jun 2011

SGI

Oracle Advanced Security with Oracle Database 11g Release 2
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 08 Jun 2011 | Published: 31 Oct 2010

Oracle Corporation
151 - 175 of 347 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement