IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)White Papers (View All Report Types)
76 - 100 of 366 Matches Previous Page  | Next Page
Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Enterprises Have Room for Improvement in Secure IT Asset Disposition
sponsored by Iron Mountain
WHITE PAPER: Access this resource to learn why secure IT disposition is a must in order to prevent data loss and compliance violations.
Posted: 12 Dec 2013 | Published: 12 Dec 2013

Iron Mountain

The RSA GRC Reference Architecture
sponsored by RSA, The Security Division of EMC
WHITE PAPER: With businesses continue to focus on governance, risk and compliance (GRC), IT professionals have to maintain efficient security policies. This in-depth white paper outlines the importance of a GRC policy and how it can help your business.
Posted: 09 Dec 2013 | Published: 30 Jun 2013

RSA, The Security Division of EMC

Taking Charge of Security in a Hyperconnected World
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.
Posted: 06 Dec 2013 | Published: 31 Oct 2013

RSA, The Security Division of EMC

Financial Institutions: Managing Operational Risk with RSA® Archer®
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Access this white paper to discover a solution that today's financial institutions can use to balance risk quantity with management quality in order to ensure an efficient and effective program.
Posted: 05 Dec 2013 | Published: 30 Nov 2013

RSA, The Security Division of EMC

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: The results of not meeting the necessary requirements are nothing but negative, including huge fines and a bad reputation. Fortunately this white paper offers a seven step guide to achieve a successful compliance management system.
Posted: 03 Dec 2013 | Published: 31 Jul 2013

Infoblox

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 25 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

Mapping Security For Your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

Applying the Four Standards of Security-Based CIA
sponsored by Global Knowledge
WHITE PAPER: High levels of optimization help to ensure that an organization's information security approach is both well-rounded and flexible enough to meet current and future threats.
Posted: 28 Oct 2013 | Published: 28 Oct 2013

Global Knowledge

10 Reasons You Need Network and Application Visibility
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views.
Posted: 17 Oct 2013 | Published: 31 Dec 2010

Riverbed Technology, Inc.

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
sponsored by IBM
WHITE PAPER: This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
Posted: 17 Dec 2013 | Published: 31 Jan 2013

IBM

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
Posted: 16 Dec 2013 | Published: 16 Dec 2013

Trend Micro

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013

Infoblox

Defending Against Denial of Service Attacks
sponsored by F5 Networks
WHITE PAPER: Access this white paper for key information about how denial of service (DoS) attacks have taken advantage of the lack of security and compliance measures around network availability. Read on to learn how you can leverage networks and applications to defend against these threats.
Posted: 25 Nov 2013 | Published: 31 Oct 2012

F5 Networks

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Fighting Back Against Network Complexity
sponsored by Infoblox
WHITE PAPER: Network management is becoming increasingly difficult, costly and time-consuming. Legacy manual procedures cannot keep up with today's complex networks. Read this white paper to learn why implementing network automation is critical to managing your network.
Posted: 20 Nov 2013 | Published: 31 Oct 2013

Infoblox

Expert Strategies: How to Adapt to Social Media While Making Sure You Stay Compliant
sponsored by Bloomberg
WHITE PAPER: In this expert white paper, gain insight on how to successfully keep compliant while protecting your business from the potential risks associated with using social media as a business tool.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Bloomberg

Plas Plastic Case Study: Virtualization Delivers Greater Flexibility
sponsored by Dell and Microsoft
WHITE PAPER: In this case study, see how one organization is benefiting from virtualizing its networks for a more scalable, efficient, and reliable IT infrastructure that is prepared for continuous growth and productivity.
Posted: 08 Nov 2013 | Published: 30 Apr 2013

Dell and Microsoft

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

ScaleN - Elastic Infrastructure
sponsored by F5 Networks
WHITE PAPER: F5 ScaleN is a breakthrough in high availability and scalability, offering the robust capabilities required to enable multi-tenant solutions, elastic applications, and infrastructure for any environment.
Posted: 01 Nov 2013 | Published: 30 Jun 2013

F5 Networks

Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data
sponsored by OpenText
WHITE PAPER: In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

OpenText

Automated Log Management for Hybrid Cloud Environments
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, discover a log management tool that addresses the needs of today's dynamic environment by providing quality of service, operational efficiency, and compliance features for optimum infrastructure and application service levels.
Posted: 18 Oct 2013 | Published: 13 May 2013

VMware, Inc.

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

Log Analytics: Simplifying Complex IT Environments
sponsored by VMware, Inc.
WHITE PAPER: Access this white paper for interviews with IT operations teams looking for better ways to effectively collect, analyze, and harness key information from logs in today's complex IT environment.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

VMware, Inc.
76 - 100 of 366 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement