Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices White Papers (View All Report Types)
1 - 25 of 288 Matches Previous Page  |  Next Page
Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

FISMA vs FedRAMP Controls and Authorization Differences
sponsored by Coalfire
WHITE PAPER: Inside this white paper, you'll learn the differences between FISMA and FedRAMP, including how the controls tested and the authorization process compare for both FISMA and FedRAMP. Read on to learn more.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Coalfire

Data Governance in the Big Data World
sponsored by Trillium Software
WHITE PAPER: In this paper you will uncover the impact of new paradigms on data governance and consider how data governance and data quality solutions are adapting to meet the requirements of this new age of big data. Download now to learn more.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Trillium Software

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Checklist: Revenue Cycle Management Pain Points
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: In this white paper uncover 13 critical questions to help you determine if your revenue cycle management (RCM) process is under control, plus tips on what to look for in RCM services and how to select the right vendor for your healthcare organization.
Posted: 14 Jan 2016 | Published: 14 Jan 2016

Allscripts Healthcare Solutions

Food & Beverage Helps Manufacturers Prepare for COOL Compliance and Recall Readiness
sponsored by Infor
WHITE PAPER: After reading this white paper, you'll be inspired to better prepare for compliance regulations by reading about how food and beverage manufacturers follow country of origin labeling (COOL.) Access now and become one step closer to creating detailed documentation that helps protect your brand integrity.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Infor

Creating a Security Program That Exceeds Any Compliance Standard
sponsored by Tenable Network Security
WHITE PAPER: This resource describes the PCI DSS, the standard technical and operational requirements to protect cardholder data.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

Automate PCI Compliance Monitoring, Investigation & Reporting
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper outlines the 12 PCI DSS requirements a compliance automation strategy needs to fulfill and explores what features to look for when selecting an approach.
Posted: 01 Dec 2015 | Published: 13 Apr 2011

AccelOps Inc.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015

LogRhythm, Inc.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Cloud Collaboration Ensures Compliance, Flight Safety
sponsored by Microsoft
WHITE PAPER: This case study explores how an air navigation service provider they designed a mobile cloud app for their document review process to ensure better compliance, collaboration, and flight safety.
Posted: 11 Nov 2015 | Published: 31 Mar 2015

Microsoft

Three Cybersecurity Developments You Can’t Ignore
sponsored by UnitedLex
WHITE PAPER: Discover the 3 developments causing CFOs nightmares in this informative white paper. Continue reading to learn the questions you need to ask security leaders to establish a robust cybersecurity strategy.
Posted: 10 Nov 2015 | Published: 30 Sep 2015

UnitedLex

Secure Cloud Infrastructure: Is Private Cloud Data Safe?
sponsored by Oracle Corporation
WHITE PAPER: Explore what security measures are required from a private cloud provider in this white paper. In addition, read on to examine one private cloud platform that can help your organization to meet these security and compliance requirements.
Posted: 06 Nov 2015 | Published: 28 Oct 2015

Oracle Corporation

CXO Guide to Security and Archiving Challenges with Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the limitations of Office 365's built in security features and how you can augement your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014

Proofpoint, Inc.

Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates and HIPAA Standards
sponsored by IBM
WHITE PAPER: Access this guide to get an overview of how enterprises can accelerate the development of B2B integration solutions that facilitate compliance with the US Affordable Care Act (ACA). Also inside learn how data processing can efficiently process data governed by the evolving body of HIPAA data standard and related mandates.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

IBM

5 Steps to Implement and Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: This white paper outlines the 5 steps to implementing and maintaining PCI DSS compliace in your organization.
Posted: 27 Oct 2015 | Published: 07 Oct 2015

AlienVault

Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

How a Vendor-Neutral Archive Can Support You Through Stage 2 Meaningful Use and Beyond
sponsored by Hitachi Data Systems
WHITE PAPER: Access this white paper to examine the details of two specific measures in the Stage 2 Meaningful Use requirements that address image enabling EHR, compliance strategies, and more.
Posted: 23 Sep 2015 | Published: 30 Apr 2015

Hitachi Data Systems

The Critical Need for Enterprise-Grade File Sync and Share
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper introduces methodologies for mitigating risks associated with consumer-focused file sync and share (CFSS) and lowering the costs of managing corporate information. Learn how enterprise-grade file sync and sharing (EFSS) will enable continued efficiency for users, while putting IT back in charge of corporate content.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IntraLinks, Inc

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Business Intelligence on Cloud: Operate and Succeed at a New Business Speed
sponsored by IBM
WHITE PAPER: This brief white paper takes you through the benefits of reporting, analysis, dashboards and visualization capabilities offered as SaaS. Access now to learn how to deploy and deliver insights faster without compromising compliance or security.
Posted: 04 Aug 2015 | Published: 31 Mar 2015

IBM

Don't Let Manual Processes Hold Up Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: This white paper explores the challenges of cloud compliance and gives advice for meeting these challenges. Learn how you can make compliance simple, even in cloud and virtual environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software
1 - 25 of 288 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement