Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesWhite Papers (View All Report Types)
1 - 25 of 356 Matches Previous Page  | Next Page
Are You a Data Hoarder?
sponsored by IBM
WHITE PAPER: Access the following article to learn about the data craze that's coursing through the business landscape and what has caused many organizations to become data hoarders. Read on to learn about various technology and techniques to ensure that you don't fall victim to hoarding data.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

IBM

Information Management: A new game plan for building a retention strategey that works
sponsored by IBM
WHITE PAPER: Consult the following white paper to uncover the steps and focal points you need to take and pay attention to in order to build a record retention strategy that works in today's data-driven environment.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

IBM

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Following the Rules, Reducing the Risk
sponsored by IBM
WHITE PAPER: This white paper discusses strategies for the often daunting challenge of meeting compliance requirements, including how to get your business' records in order, select technology to help with the task of information governance, and more.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

IBM

Managing Legal Content in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: For law firms and corporate legal departments, the dynamics of a cloud delivery approach can be attractive. Learn more about how HP Worksite in the Cloud makes this possible.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Hewlett-Packard Company

MU2 Gaps Closing Through Direct Clinical Information Exchange
sponsored by Kodak
WHITE PAPER: This white paper explains how Direct Messaging works, how it can help providers meet Meaningful Use Stage 2 requirements, outlines benefits for both providers and patients, and explores how Direct Messaging will be implemented across the healthcare industry.
Posted: 17 Oct 2014 | Published: 17 Oct 2014

Kodak

How Alert Logic Helped BancBox to Protect Payment Information in the Cloud
sponsored by Alert Logic
WHITE PAPER: This white paper describes Alert Logic's collaboration with BancBox, a payment service provider, to find a way to protect payment information and meet PCI compliance mandates in a cloud environment.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Alert Logic

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Retail Shopping Has Become More Personal, Relevant and Profitable
sponsored by Aerohive Networks
WHITE PAPER: This white paper reveals a strategy that defines a cloud-based approach to personalising the retail experience for every customer.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Bay Cove Human Services Achieves HIPAA Compliance on Google Apps & BYOD
sponsored by BitGlass
WHITE PAPER: This short white paper details how Bay Cove Human Services collaborated with BitGlass to achieve HIPAA compliance while still enabling the company to utilize Google Apps as their productivity backbone.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Manage Data Retention, Access, and Destruction on a Single Scalable Platform
sponsored by Avnet
WHITE PAPER: This white paper introduces Avnet Services' Archive Manager for HP Application Lifecycle Management, designed to store and access HP Quality Center and ALM requirements, tests, runs, and defects on a common platform.
Posted: 09 Oct 2014 | Published: 30 Apr 2014

Avnet

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM

Tips for Securing ePHI in the Cloud
sponsored by Peak 10
WHITE PAPER: In this white paper, get tips for storing your ePHI in the cloud. Discover the top considerations to keep in mind when looking for a trusted provider.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Peak 10

Governancy Tips for Midmarket IT Leaders
sponsored by Peak 10
WHITE PAPER: Access this resource for a guide to governance so you can maintain compliance and create business value.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Peak 10

Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data
sponsored by BitGlass
WHITE PAPER: This white paper explores technologies that combine the flexibility of public cloud apps like Salesforce and Box with the security and compliance of a private cloud.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper describes how BitGlass partnered with AMAG Pharmaceuticals to resolve critical security and privacy issues following the company's adoption of Google Apps' cloud and BYOD tools.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

1 - 25 of 356 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement