Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices White Papers (View All Report Types)
1 - 25 of 314 Matches Previous Page  |  Next Page
Compliance at Velocity
sponsored by Chef Software
WHITE PAPER: Discover why compliance at velocity is not only a possibility, but a reality. Learn how compliance can become simply another step on the assembly line and the idea of infrastructure as code, which allows your enterprise to specify its compliance-related requirements in ways that can be automatically tested.
Posted: 21 Oct 2016 | Published: 01 Jun 2016

Chef Software

Transforming Finance Processes for the Digital Economy
sponsored by SAP
WHITE PAPER: Finance is at the heart of the digital business, but the financial processes and technology platforms that have been utilized in the last 20 years aren't agile enough for the digital economy. Access this white paper to explore a modern approach to managing critical processes like planning and analysis, risk management, compliance, and more.
Posted: 17 Oct 2016 | Published: 17 Oct 2016


Why Security is a key part of an Office 365 Implementation
sponsored by Symantec + Blue Coat
WHITE PAPER: Are your security solutions prepared to handle the increase in traffic brought on by cloud apps? Learn how to add additional security to safeguard your organization and stay compliant when you move into the Office 365 cloud.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat

Log Management and Automation for NIST Cyber Security Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.
Posted: 07 Oct 2016 | Published: 30 Nov 2014

LogRhythm, Inc.

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

Intralinks for Regulatory Risk Management
sponsored by IntraLinks, Inc
WHITE PAPER: Discover how to securely exchange data and documents across organizations while keeping within ever changing regulatory requirements. Learn how to centralize work papers for easy access and streamline enterprise risk assessments to quickly improve your security posture.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

IntraLinks, Inc

Solutions for HIT Vendors Overview (US)
sponsored by VASCO Data Security International
WHITE PAPER: Discover how to simplify the adoption of regulatory requirements for EPCS, while improving efficiencies and reducing fraudulent activity. Learn how you can protect your complex technical environments, improve provider productivity and efficient patient care all within this short white paper.
Posted: 03 Oct 2016 | Published: 31 Dec 2015

VASCO Data Security International

10 Real-Time Reporting Strategies for Better Security and Compliance
sponsored by Dell Software
WHITE PAPER: With real-time auditing tools, you can immediately uncover what's happening in your environment. Learn about 10 reports designed to help you track changes in real-time, receive alerts about critical changes, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell Software

How one Investment Company Ensures Compliance while Slashing their IT Workload
sponsored by Dell Software
WHITE PAPER: Dragon Capital was able to audit changes to user access permissions and easily meet its compliance requirements. Learn how this investment firm enabled critical changes in real time, investigate incidents in minutes rather than hours or days, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell Software

Cisco 2016 Midyear Cybersecurity Report
sponsored by OpenDNS
WHITE PAPER: The Cisco 2016 Midyear Cybersecurity Report provides insights for security professionals on the trends and developments affecting the security landscape for the last half of the year. Access now and go to page 45 in particular for a discussion on ransomware attacks on healthcare organizations.
Posted: 30 Sep 2016 | Published: 01 Jul 2016


GRC for the Real World: 4 Pillars of Success
sponsored by Dell Software
WHITE PAPER: When organizations leave behind clusters of poorly matched tools and avert the rise of siloes, they are better able to meet GRC requirements. Learn more about the four pillars of a successful GRC program.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Compliant Digital Identity Protection for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover how you can protect identities, safeguard patient records, and enable compliance with regulations - all without disrupting fast access to healthcare applications and patient information. Learn how to make threats less threatening and ensure smooth patient care throughout your organization.
Posted: 29 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

Companies, Digital Transformation and Information Privacy: The Next Steps
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Hewlett Packard Enterprise

The General Data Protection Regulation Challenge
sponsored by Close Brothers Technology Services
WHITE PAPER: This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.
Posted: 21 Sep 2016 | Published: 30 Jun 2016

Close Brothers Technology Services

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

STEALTHbits Solutions for Addressing Real World Security and Compliance
sponsored by STEALTHbits
WHITE PAPER: This document discusses four deployments of STEALHbits and how these organizations fit the solutions into their existing infrastructure.
Posted: 14 Sep 2016 | Published: 01 Aug 2016


Build a Data Access Governance Program to Control Unstructured Data
sponsored by STEALTHbits
WHITE PAPER: Following this 5 step plan will help ensure your organization has its data secured. By the end, you will know how to survey all your organization's data, focus attention where it matters most, get the right stakeholders involved, review and remediate access, and arrive at a working security model to meet both security and compliance needs.
Posted: 09 Sep 2016 | Published: 31 Dec 2015


Removing the Risk from Compliance in the Cloud
sponsored by VMware
WHITE PAPER: Learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Discover how to ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.
Posted: 19 Aug 2016 | Published: 01 Jul 2016


Compliance - The New Hot Button for CIOs
sponsored by VMware
WHITE PAPER: This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.
Posted: 16 Aug 2016 | Published: 01 Jan 2016


Cloud Classified
sponsored by Armor
WHITE PAPER: Discover how a popular utility provider was able to enact their tokenization project and come into compliance with PCI 3.0 mandates. Learn how they migrated the bulk of their infrastructure out of the scope of what would be assessed, helping them save millions of dollars.
Posted: 09 Aug 2016 | Published: 01 Jul 2016


‘But I Was Compliant’
sponsored by Armor
WHITE PAPER: Learn how to take a holistic approach to security and, in the process, easily meet regulatory requirements. Look beyond your checklist to ensure data security and the health of your organization.
Posted: 09 Aug 2016 | Published: 01 Jul 2016


Fundamental Review of the Trading Book Standardised Model Approach From SAS®
sponsored by SAS
WHITE PAPER: The new standardized model from The Fundamental Review of the Trading Book (FRTB) will have a massive impact on all financial institutions, and is already creating compliance challenges. Uncover an innovative, cost-effective route to improving data quality and gaining regulatory compliance. Discover the technology that will simplify implementation.
Posted: 22 Jul 2016 | Published: 22 Jul 2016


How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

4 Steps to Effectively Managing Risk and Compliance for Financial Services
sponsored by IBM
WHITE PAPER: Learn why convergence is key to maximizing governance efforts, and discover the 4 steps financial services organizations can take to mitigate compliance risks.
Posted: 22 Jul 2016 | Published: 31 May 2011

1 - 25 of 314 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement