Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices White Papers (View All Report Types)
1 - 25 of 319 Matches Previous Page  |  Next Page
3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 30 Jul 2015 | Published: 09 May 2014

Citrix

Internal Audit and Its Evolving Role in GRC
sponsored by IBM
WHITE PAPER: Audit departments are now increasingly becoming viewed as key players in the context of corporate governance, risk and compliance (GRC) objectives. Access this white paper to discover details on internal audit and its role in empowering the organization to address key business risks as well as deduce emerging risks.
Posted: 29 Jul 2015 | Published: 30 Nov 2015

IBM

Practical Guidelines for Active Risk Management when Managing Oracle Licenses
sponsored by Matrix42
WHITE PAPER: This white paper presents the 10 commandments to surviving an Oracle audit.
Posted: 28 Jul 2015 | Published: 29 Apr 2015

Matrix42

Mapping the Cloud Maturity Curve: Adapting to the New Era
sponsored by IBM
WHITE PAPER: The following analysis of cloud maturity is based on findings from 784 surveyed IT leaders around the globe. Access now to unlock five key fundamentals of cloud maturity, from aligned strategy to good governance.
Posted: 17 Jul 2015 | Published: 31 Dec 2015

IBM

Avoiding Audit Surprises: Why License Compliance is a C-level Issue
sponsored by Matrix42
WHITE PAPER: This white paper examines how to optimize long-term license management and relieve your IT staff of manual tasks.
Posted: 16 Jul 2015 | Published: 30 Jun 2015

Matrix42

Rethinking License Management: Mobile App Delivery and Access Made Easy
sponsored by Matrix42
WHITE PAPER: This white paper outlines how to treat license management as a proactive process rather than just a standalone management tool. Continue reading to learn more.
Posted: 15 Jul 2015 | Published: 01 Jul 2015

Matrix42

The Advantages of a Unified Management Approach to End-User Devices
sponsored by Accelerite
WHITE PAPER: This white paper assures that, by forming strategic single endpoint management to cover all types of devices and operating systems, IT and your organization can reap many benefits. Discover the key to simplified, efficient compliance for administrators and self-service capabilities for end-users.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

Accelerite

Top 4 Security Concerns of the SaaS Delivery Model
sponsored by SAP
WHITE PAPER: This white paper addresses security concerns brought forth by cloud and SaaS models, including identity management, data storage, and data transmission. Learn the imperatives of built-in security features when it comes to your deployment.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

SAP

A Focus on Cloud Security, So You Can Focus on Business
sponsored by SAP
WHITE PAPER: This white paper stresses the critical importance of information protection in a cloud environment. Discover ways to implement security controls and practices in your SaaS strategy.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

SAP

Information governance in a big data world
sponsored by IBM
WHITE PAPER: With big data analytics and the influx of information streaming into your organization, your data governance approach will either unify people, processes, and technology – or tear them apart. Access this white paper and discover the key to creating a holistic governance framework that supports your business objectives and revenue goals.
Posted: 06 Jul 2015 | Published: 30 Sep 2014

IBM

Understanding Data Protection Regulations in the US
sponsored by Varonis
WHITE PAPER: This white paper outlines several important security regulations in the United States and gives advice on successfully meeting all of them.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Ignore Compliance, Focus on Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how enterprises that focus on security first to address an organization's sensitive data will solve compliance requirements along the way. Instead of following a compliance checklist, learn to tackle the 5 risk assessment methodologies to mitigate threats and ensure confidentiality.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

The Evolution of Data Privacy
sponsored by Symantec Corporation
WHITE PAPER: This white paper assures that optimizing the way you handle data privacy will in turn optimize the way your business responds to customers, partners and employees. The confidence to be able to handle compliance regulations can provide you with assurance in your customer service levels, and more.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015

Commvault

Predictive Threat and Risk Management: Meeting the Challenges of a Smarter Planet
sponsored by IBM
WHITE PAPER: No organization can - or should - put up with billions in losses due to poor risk management. This white paper brings to light the digital security made possible by business analytics. Access this resource if you are plagued by virtual surveillance challenges.
Posted: 11 Jun 2015 | Published: 31 Dec 2013

IBM

Meeting PCI and ISO Compliance Checklist
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides a checklist for meeting PCI and ISO compliance. Access now and discover what it takes to keep the cyber criminals at bay when it comes to your client's credit card information.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

Hertz - World leading car rental company usesVMware View to simplify infrastructure andimprove user experience
sponsored by VMware
WHITE PAPER: This white paper explains how VMware can help you simplify your server and desktop environment through virtualization. Read now to find out how Hertz cut costs and improved compliance.
Posted: 28 May 2015 | Published: 28 May 2015

VMware

Achieve Data Governance and Quality With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.
Posted: 27 May 2015 | Published: 27 May 2015

Information Builders

Mobile Call Recording: Are You Complying or Compromising?
sponsored by Smart Numbers
WHITE PAPER: Access this white paper now to learn why implementing a business call recording policy is essential to corporate protection and how to deploy a solution that is simple, effective, and affordable.
Posted: 21 May 2015 | Published: 21 May 2015


A New Security Strategy: Focusing on Risk
sponsored by Clearswift
WHITE PAPER: This white paper explores how to shift your security strategy from a compliance-based model to a risk-based model to protect strategic assets. Continue reading and discover how to improve your overall security strategy by implementing a security training and awareness program.
Posted: 20 May 2015 | Published: 29 Apr 2015

Clearswift

Case Study: Cloud Content Management Investments
sponsored by Box
WHITE PAPER: This infographic depicts the anatomy of a decision for cloud content management investments. Learn about how one law firm successfully leveraged online connectivity to bring together a distributed team of attorneys occupying home and regional offices.
Posted: 20 May 2015 | Published: 20 May 2015

Box

FAQ: Recycle Bin and Recovery Manager for Active Directory
sponsored by Dell Software
WHITE PAPER: This brief yet informative white paper covers the functionalities of the Active Directory Recycle Bin. Use this resource to assess whether or not your organization can leverage this technology despite its short-comings.
Posted: 13 May 2015 | Published: 02 Jan 2012

Dell Software

Case Study: Coca-Cola Reduces its Migration Timeline by 33%
sponsored by Dell Software
WHITE PAPER: This brief white paper pinpoints savvy strategies for email migration, using CCBCC as an example. Discover ways to transition with ease of installation, technical support and cost-cutting migration technology.
Posted: 13 May 2015 | Published: 28 Sep 2012

Dell Software

Email Migration: Don't be a Burden, be On-Budget
sponsored by Dell Software
WHITE PAPER: This white paper emphasizes ways to mitigate the risks of email transitioning. Discover how to reduce the burden on the migration team and help desk while reaping six key benefits
Posted: 13 May 2015 | Published: 31 Dec 2014

Dell Software
1 - 25 of 319 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement