IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) White Papers (View All Report Types)
151 - 175 of 374 Matches Previous Page  |  Next Page
Total Quality Assurance for Businesses with a Global Business Plan
sponsored by IFS
WHITE PAPER: Establishing a business that is competitive on a global spectrum can be challenging. View this white paper to learn more about how you can deploy a complete quality assurance package that provides the support your business needs. It outlines what you should be looking for in a source so you can be certain you've made the right selection.
Posted: 18 Feb 2013 | Published: 18 Feb 2013


Addressing Changes in the Healthcare IT Legislative and Regulatory Environment
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper focuses on major advances in cloud client computing solutions supported by Virtual Desktop Infrastructure (VDI), and how these technologies can address the challenges facing health care providers by providing a more flexible, integrated, and virtualized IT environment.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Dell, Inc. and Intel®

Where is the smart money going in ICT ?
sponsored by
WHITE PAPER: Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment.
Posted: 29 Nov 2012 | Published: 24 Mar 2011

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012


Mitigating the Risks of IT Change
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.
Posted: 19 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.

Managing Threat in a Digital Age
sponsored by IBM
WHITE PAPER: Access this comprehensive paper about managing threats in the modern, digital age to learn why security has become a C-suite priority, and find insight into various types of threats and uncover the three biggest steps execs should take toward building "security intelligence."
Posted: 08 Mar 2013 | Published: 31 Aug 2011


Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012


Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

LogRhythm, Inc.

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
sponsored by Dell Software
WHITE PAPER: This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities.
Posted: 23 Jul 2012 | Published: 31 Dec 2011

Dell Software

Making Office 365 More Secure and Compliant
sponsored by Dell Software
WHITE PAPER: This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Dell Software

Manage Data Growth
sponsored by Dell, Inc.
WHITE PAPER: If you're one of the many IT admins struggling to stay afloat in this data flood, check out this two-page white paper to learn how to get your data future-ready, how to improve your forecasting and how to align the relative business value of your data with a suitable storage cost.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell, Inc.

Bluelock Virtual Datacenters Instrumental in Patronpath’s PCI-DSS Compliance in the Cloud
sponsored by Bluelock
WHITE PAPER: One of the biggest challenges and concerns of businesses moving to the cloud is ensuring regulatory compliance and security. Discover how Patronpath, a company that processes and handles online credit card transactions for customers, increased scalability and decreased costs by adopting PCI-compliant cloud services.
Posted: 14 May 2012 | Published: 02 May 2012


7 Tips for Achieving Active Directory Compliance
sponsored by Dell Software
WHITE PAPER: Discover 7 key tips to help you achieve and maintain compliance in Active Directory, including what to keep an eye on, warning signs to look out for and how to leverage auditing tools to simplify the process in this essential resource.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Dell Software

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA
WHITE PAPER: This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Posted: 27 Mar 2012 | Published: 27 Mar 2012


The Role of Governance, Risk Management & Compliance in Organizations
sponsored by RSA
WHITE PAPER: Meeting enterprise Governance, Risk and Compliance (eGRC) objective is very challenging in today’s IT world. This white paper outlines the results of a study that surveyed 190 individuals from one of the largest eGRC practitioner communities.
Posted: 27 Mar 2012 | Published: 02 May 2011


Oracle Database 11g Release 2 High Availability
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 12 Mar 2012 | Published: 31 Oct 2010

Oracle Corporation

Kahuna Ventures Eliminates Email PST Files and Improves Data Retention and Recovery with Metalogix
sponsored by Metalogix
WHITE PAPER: Discover how a company reduced its email volume by 50 percent and enabled faster backups and recovery with an email archiving solution. Explore the advantages of implementing this archiving system, including the ability to eliminate management of burdensome PST files and comprehensive legal retention features.
Posted: 16 Feb 2012 | Published: 16 Feb 2012


Facilitating “sound practices” in risk management with IBM OpenPages ORM
sponsored by IBM
WHITE PAPER: This white paper discusses operational risk management (ORM) in the context of "Sound Practices for the Management and Supervision of Operational Risk," a paper from the Basel Committee.
Posted: 08 Feb 2012 | Published: 08 Feb 2012


sponsored by Idera
WHITE PAPER: This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks.
Posted: 31 Jan 2012 | Published: 31 Jan 2012


Cloud Computing: Get to know the basics
sponsored by Red Hat
WHITE PAPER: This white paper explains how government IT can enjoy cloud capabilities while keeping existing IT investments and avoiding vendor lock-in. Explore how open source and application portability in the cloud and the relationships between technology providers are critical to building a successful cloud strategy.
Posted: 23 Jan 2012 | Published: 05 Jan 2012

Red Hat

Top 10 reasons to strengthen information security with desktop virtualization
sponsored by Citrix and Microsoft
WHITE PAPER: Sophisticated threats, device proliferation and a growing burden of compliance and data privacy requirements are changing the information security landscape. Find out why Citrix desktop virtualization should be the foundation of your security strategy.
Posted: 19 Jan 2012 | Published: 19 Jan 2012

Citrix and Microsoft

Managing Big Data Using Sybase IQ VLDB Option
sponsored by Sybase, an SAP company
WHITE PAPER: This brief white paper outlines information lifecycle management (ILM), a set of strategies for managing the growth, storage and retrieval of information over its useful life. Its goal is to ensure that frequently accessed data is returned as fast as possible, while controlling storage costs.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

Sybase, an SAP company
151 - 175 of 374 Matches Previous Page    5 6 7 8 9 10    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement