Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices White Papers (View All Report Types)
1 - 25 of 336 Matches Previous Page  |  Next Page
How Privileged Activity Monitoring Streamlines Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives suggestions for how you can use privileged activity monitoring to simplify your audit creation , particularly when it comes to ISO compliance.
Posted: 24 Apr 2015 | Published: 24 Feb 2014

BalaBit

The Elephant in the Room: What Vendors Are Hiding about Communications Security
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses why communications vendors don't discuss their products' security and shows you how you can ensure safety, compliance and reliability in all your business communications.
Posted: 22 Apr 2015 | Published: 31 Mar 2014

8x8, Inc.

Make the Impossible Possible: Simplifying ISO Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives some helpful guidelines for compliance by laying out the steps necessary for complying with the latest revision of ISO.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

BalaBit

PCIDSS Compliance and Privileged Access Monitoring
sponsored by BalaBit
WHITE PAPER: This white paper explores how to control and audit data access on servers, networking devices, and virtualized applications and ensure PCI compliance.
Posted: 21 Apr 2015 | Published: 24 Feb 2014

BalaBit

When Retention Schedules Shouldn't Live Up to their Name
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you understand how retention schedules have unintentionally misled companies into keeping unneeded data. Learn why taking the leap to get rid of excess information is a solid way to govern it, lessen risk, and save money.
Posted: 19 Apr 2015 | Published: 20 Apr 2015

Iron Mountain

How to Determine Proper Protocol for ROT
sponsored by Iron Mountain
WHITE PAPER: This white paper offers recommendations for consolidating your Redundant, Obsolete and Trivial content (ROT.) Learn the importance of deleting electronic records after suitable retention periods, and how doing so yields multiple benefits.
Posted: 19 Apr 2015 | Published: 31 Dec 2014

Iron Mountain

Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5 step approach. Access now and discover how to overcome data security struggles and use people and processes to enhance technology solutions.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

Addressing HACCP Issues Within the Food and Beverage Industry Using ERP Software
sponsored by IFS
WHITE PAPER: Learn how your organization can put in place a system to comply with HACCP guidelines in this white paper. Uncover the importance of an effective ERP system in compliance for the purposes of gathering, tracking, and reporting functionality.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

IFS

Could HIPAA Make Criminals Out of People You Know?
sponsored by 8x8, Inc.
WHITE PAPER: This white paper teaches you how to evaluate telecom providers for storing important data such as faxes, voicemail, and other PHI. View now to learn when to trust an organization as an associate and when to realize red flags are being raised.
Posted: 17 Apr 2015 | Published: 18 Aug 2014

8x8, Inc.

Mobile Management Compliance Checklist in Financial Services
sponsored by BlackBerry
WHITE PAPER: This white paper provides you with the essential questions to ask when evaluating an EMM solution and how to ensure compliance.
Posted: 14 Apr 2015 | Published: 04 Dec 2014

BlackBerry

Infographic: The UK’s Evolving BYOD Strategies
sponsored by Dell, Inc.
WHITE PAPER: Access this informative infographic to uncover useful statistics uncovered by computer technology researchers regarding security concerns relevant to BYOD strategies.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Dell, Inc.

Internet System for Tracking Over-Prescribing (I-Stop) FAQ
sponsored by Imprivata
WHITE PAPER: Access this white paper to find out about frequently asked questions regarding software that tracks over-prescribing. Read on to learn more about the laws and regulations, software and data requirements, and more.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

Researchers Confirm: Collaboration Strategies Bring a "Suite" of Solutions
sponsored by Microsoft
WHITE PAPER: Decision-makers won't want to miss this study on the effects of pragmatic teamwork solutions. Access now, and better understand the benefits, costs, and risks associated with a collaboration implementation. Business technology consultants have laid out quantifiable assets to be gained, inclusive of several key business areas.
Posted: 10 Apr 2015 | Published: 31 Oct 2014

Microsoft

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper outlines the 5 steps to achieving PCI compliance and security harmony.  View now to learn more.
Posted: 10 Apr 2015 | Published: 06 Oct 2014

Bit9 + Carbon Black

An IT Auditor's Guide to Security Controls & Risk Compliance
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper provides a framework for simplifying compliance enforcement and audits through six key policy controls.  Access now to learn how to achieve compliance harmony.
Posted: 09 Apr 2015 | Published: 05 Nov 2014

Bit9 + Carbon Black

Top 10 Measurement and Planning Mistakes and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Access this white paper to review the 10 most common planning and measurement errors that businesses commit. In addition to examining these blunders, discover real-world examples of how an enterprise can avoid or correct them. Learn strategic solutions, such as setting sensible goals.
Posted: 08 Apr 2015 | Published: 31 Dec 2014

Information Builders

A Quick Guide to EPCS
sponsored by Imprivata
WHITE PAPER: This white paper outlines how to put EPCS efforts and planning into action and what to include in your compliance strategy.
Posted: 08 Apr 2015 | Published: 05 Nov 2014

Imprivata

Gartner's Magic Quadrant for IT Risk Management 2015
sponsored by Modulo
WHITE PAPER: This white paper examines the strengths and weaknesses of several ITRM platforms and provides insight into the market. View now to uncover the need to know facts about ITRM and how to choose the platform right for your organization.
Posted: 06 Apr 2015 | Published: 10 Mar 2015

Modulo

Data Analytics Security Platform Buyer's Guide
sponsored by HP Security Voltage
WHITE PAPER: This white paper explores how to protect your data to stay compliant with today's stringent healthcare regulations. Read on to learn more
Posted: 03 Apr 2015 | Published: 19 Nov 2014

HP Security Voltage

Improving Supply Chain Security for Better Business Governance
sponsored by Modulo
WHITE PAPER: This white paper outlines how governance, risk, and compliance management can provide a sound structure for threat mitigation.
Posted: 02 Apr 2015 | Published: 28 Jan 2015

Modulo

Streamlining Information Protection Through a Data-centric Security Approach
sponsored by HP Security Voltage
WHITE PAPER: This resource introduces a new strategy that combines data encryption and masking to simplify privacy management and mitigate leakage. View now to learn the five step plan to successful production data protection.
Posted: 02 Apr 2015 | Published: 02 May 2013

HP Security Voltage

Use ERM to bring together scattered GRC efforts
sponsored by Modulo
WHITE PAPER: Read this brief white paper to discover how using such a software can simplify your job and enhance your GRC management.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Modulo

Predictive Coding: The Next Frontier in eDiscovery
sponsored by Zovy LLC
WHITE PAPER: Predictive coding, a form of technology assisted review (TAR), has been and will continue to dramatically change the way discovery is conducted during legal cases. Predictive coding is considerably more powerful than basic keyword searches. This whitepaper examines the value of predictive coding and how it can help organizations conduct eDiscovery.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Zovy LLC

GRC: An Alternative  Approach to Spreadsheets in Risk Management
sponsored by Modulo
WHITE PAPER: This white paper outlines the cost and complexity reducing benefits offered by one GRC strategy.  View now to learn how to retire spreadsheets and manual processes.
Posted: 30 Mar 2015 | Published: 10 Sep 2014

Modulo

Navigating the Legal and Compliance Implications of BYOD
sponsored by Dropbox for Business
WHITE PAPER: This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.
Posted: 30 Mar 2015 | Published: 04 Dec 2013

Dropbox for Business
1 - 25 of 336 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement