Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Auditing

RSS Feed    Add to Google    Add to My Yahoo!
Compliance AuditingWhite Papers (View All Report Types)
 
Records Management Implications of The Affordable Care Act
sponsored by Iron Mountain
WHITE PAPER: This white paper explores the implications of major regulations updates being made due to the Accordable Care Act (ACA) to healthcare records management in 2014.
Posted: 10 Apr 2014 | Published: 07 Nov 2013

Iron Mountain

Audits, Compliance and Security: ITPros share their experience
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper talks about a solution that allows users to better track and audit malicious or unintentional changes to their Windows environment. It gives interviews with users from various industries to see how the solution worked for them.
Posted: 10 Mar 2014 | Published: 07 Mar 2014

Dell, Inc.

When It's Time for an Audit, Will You Be Ready?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices on how to best prep yourself for the audit process - learn how to create a backup and recovery plan that includes the right audit and accountability features, discover four keys to help you on the path to compliance and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Software Lifecycle Management: Managing Essential Enterprise Tools for Greater Productivity and Cost Savings
sponsored by CDW Corporation
WHITE PAPER: This resource is a guide to software management, and highlights key approaches that will help you ensure productivity without additional costs.
Posted: 28 Feb 2014 | Published: 30 Apr 2013

CDW Corporation

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 20 Mar 2014 | Published: 31 May 2013

IBM

Developing an Information Governance Strategy: An Osterman Research White Paper
sponsored by Rand Secure Data
WHITE PAPER: This resource homes in on the challenges of information governance and offers 13 key recommendations to help you improve information governance practices.
Posted: 17 Mar 2014 | Published: 28 Feb 2014

Rand Secure Data

#CompliantData: The Social Media Data Archiving Conundrum
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover how to set the stage for social media success - learn how to gauge risk vs. reward in social media, discover how to update your compliance strategy to include social media, receive best practices for staying on top of archiving regulations and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Risk and Compliance Outlook
sponsored by McAfee, Inc.
WHITE PAPER: Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

McAfee, Inc.

How can Identity and Access Management Improve IT Security and Reduce Risk to Help Drive my Business?
sponsored by CA Technologies.
WHITE PAPER: IAM builds a foundation for effective security by helping ensure all users have only the appropriate level of access rights to all protected resources, and that those rights are enforced appropriately. Read this executive brief to learn more about taking control of IT operations and information security with Content-Aware IAM.
Posted: 25 Nov 2010 | Published: 01 Sep 2010

CA Technologies.

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement