IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) White Papers (View All Report Types)
26 - 50 of 405 Matches Previous Page  |  Next Page
"IDC survey data suggests managed SIEM solutions are worth a lookIDC data suggests managed SIEM can offer better security than internal IT 60% of organizations say managed SIEM solutions improve security over internal IT"
sponsored by Alert Logic
WHITE PAPER: In this white paper, explore how SIEM systems close visibility gaps. Learn how to choose the right platform for your organization and maximize the benefits today.
Posted: 17 Mar 2015 | Published: 05 Nov 2014

Alert Logic

How Personalized, Compliant Service Boosts Loyalty and Avoids Liability
sponsored by Oracle Corporation
WHITE PAPER: Access this informative white paper to learn more about the complex relationship between compliance and personalization. Get 5 steps to boost loyalty and avoid liability.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Oracle Corporation

Defensible Disposition: Knowing What Information to Delete
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn the reasons that defensible disposition programs stall out. Get several strategies to help organizations "push the delete button" with confidence.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

Hewlett-Packard Company

File Transfers and the Rapidly-Changing Compliance Environment: A Global Perspective
sponsored by Ipswitch File Transfer
WHITE PAPER: This white paper highlights 6 serious file transfer issues that you must confront, for both of your organization's IT strategies and day-to-day operations.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

The Definitive Guide to Managed File Transfer: Attaining Automation, Security, Control & Compliance
sponsored by Ipswitch File Transfer
WHITE PAPER: This white paper explains the story behind MFT, and reveals how important it is in today's data-driven, security-conscious, and compliance-intensive environment.
Posted: 10 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Financial Services: Modern Big Data Architectures
sponsored by Red Hat
WHITE PAPER: Know your customer (KYC) policies and practices that are part of the response to anti-money laundering (AML) are becoming critical in meeting requirements of the US Patriot Act. Read this technology overview to learn about a solution for KYC and AML compliance.
Posted: 09 Mar 2015 | Published: 31 Jan 2015

Red Hat

Quick Guide to HIPAA Contingency Plan Compliance with Recovery-as-a-Service
sponsored by Bluelock
WHITE PAPER: View this informative white paper that explains how recovery-as-a-service (RaaS) can help ensure vital data and systems persist indefinitely, and can be rapidly recovered and brought back to a production state.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Bluelock

ERP For DCAA Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about compliance requirements for working with the Department of Defense and determine whether your ERP software is up to the necessary standards.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

4 ERP Tips For FIAR Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about what it means to be in FIAR compliance and get 4 ERP tips that can help attain auditability for your business.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

Have You Considered Desktop as a Service in the Cloud?
sponsored by NaviSite
WHITE PAPER: View this resource to investigate a particular desktop as a service provider that is cloud compatible.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

NaviSite

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Providing Security and Compliance for an Ever-Growing Number of Endpoints
sponsored by IBM
WHITE PAPER: This white paper introduces you to an easy-to-manage, quick-to-deploy solution that supports security for a large variety and large numbers of endpoints — from servers to desktop PCs, Internet-connected laptops, smartphones and other mobile devices, as well as specialized equipment such as point-of-sale devices, ATMs and self-service kiosks.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

IBM

5 Reasons MSP's Love Time-Based Cloud Retention
sponsored by Datto, Inc.
WHITE PAPER: This executive brief highlights a service for managed service providers designed to take charge of backup, disaster recovery and business continuity.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Datto, Inc.

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Absolute Software

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Top 5 Reasons to Choose HP White Paper
sponsored by Hewlett-Packard Company
WHITE PAPER: When managing big data, archiving solutions need to be intelligent and scalable. This informative white paper outlines the top five reasons to choose HP information archiving
Posted: 29 Dec 2014 | Published: 29 Dec 2014

Hewlett-Packard Company

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

The hidden value of archiving
sponsored by Mimecast
WHITE PAPER: The sheer amount of data flowing through email can put a strain on IT. How can companies keep the data they need in case of legal action?This white paper outlines the value of archiving over backup.
Posted: 19 Dec 2014 | Published: 31 Aug 2014

Mimecast

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to HIPAA guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Migration Engine from Butterfly Software
sponsored by IBM
WHITE PAPER: This resource provides an overview of the migration procedure and an explanation for how your organization can access all of its data from a single backup platform, improving your RTO and RPO objectives and ensuring you are legally compliant as well as reducing your overall carbon footprint.
Posted: 12 Nov 2014 | Published: 31 May 2013

IBM

Deploying Microsoft Exchange 2013 Just Got Easier
sponsored by Citrix
WHITE PAPER: Access this informative guide that explains how to deploy Microsoft Exchange 2013 with an ADC that ensures remote access and load balancing of core components.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Citrix

Creating a successful road map for cloud deployment
sponsored by IBM
WHITE PAPER: View this informative resource to access critical steps needed on the journey to meet your business needs and long-term career goals.
Posted: 05 Jan 2015 | Published: 01 Nov 2014

IBM
26 - 50 of 405 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement