Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices White Papers (View All Report Types)
1 - 25 of 332 Matches Previous Page  |  Next Page
Companies, Digital Transformation and Information Privacy: The Next Steps
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Hewlett Packard Enterprise

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

2016 Data Threat Report: Trends in Encryption and Data Security
sponsored by Vormetric
WHITE PAPER: Access this report now to learn statistics from around the globe describing how large enterprises are misplacing their security dollars and what you can do to best protect your sensitive data in today's hostile cyber environment.
Posted: 15 Sep 2016 | Published: 01 Aug 2016

Vormetric

STEALTHbits Solutions for Addressing Real World Security and Compliance
sponsored by STEALTHbits
WHITE PAPER: This document discusses four deployments of STEALHbits and how these organizations fit the solutions into their existing infrastructure.
Posted: 14 Sep 2016 | Published: 01 Aug 2016

STEALTHbits

Build a Data Access Governance Program to Control Unstructured Data
sponsored by STEALTHbits
WHITE PAPER: Following this 5 step plan will help ensure your organization has its data secured. By the end, you will know how to survey all your organization's data, focus attention where it matters most, get the right stakeholders involved, review and remediate access, and arrive at a working security model to meet both security and compliance needs.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Evolution of Regulatory Capital Planning, Measurement, and Management
sponsored by SAS
WHITE PAPER: A key drawback of the Basel framework is its focus on historical capital adequacy, which does not help assess the impact of stress events on banks. Learn about how banks need an appropriate system to combine compliance with these risk-based capital adequacy regulations.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

SAS

How Trend Micro Stacks Up among Endpoint Protection Vendors
sponsored by TrendMicro
WHITE PAPER: This Gartner Magic Quadrant report offers cyber security executives invaluable information you can use to choose your next endpoint protection vendor.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Cloud Classified
sponsored by Armor
WHITE PAPER: Discover how a popular utility provider was able to enact their tokenization project and come into compliance with PCI 3.0 mandates. Learn how they migrated the bulk of their infrastructure out of the scope of what would be assessed, helping them save millions of dollars.
Posted: 09 Aug 2016 | Published: 01 Jul 2016

Armor

‘But I Was Compliant’
sponsored by Armor
WHITE PAPER: Learn how to take a holistic approach to security and, in the process, easily meet regulatory requirements. Look beyond your checklist to ensure data security and the health of your organization.
Posted: 09 Aug 2016 | Published: 01 Jul 2016

Armor

Fundamental Review of the Trading Book Standardised Model Approach From SAS®
sponsored by SAS
WHITE PAPER: The new standardized model from The Fundamental Review of the Trading Book (FRTB) will have a massive impact on all financial institutions, and is already creating compliance challenges. Uncover an innovative, cost-effective route to improving data quality and gaining regulatory compliance. Discover the technology that will simplify implementation.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

SAS

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

Mobility In Financial Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BlackBerry

How a Top 10 Bank Uses A Data Analytics Tool to Manage Operational Risk
sponsored by Infogix
WHITE PAPER: In this case study, learn about the analytics tool a top 10 U.S. Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including reduced costs while increasing productivity, processed full audit in real time, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2014

Infogix

Smarter Commerce Spells Sweet Success for Gourmet Baker
sponsored by VAI, Vormittag Associates, Inc.
WHITE PAPER: Read this "Food Logistics" article to find out how, with the help of an IT vendor, a gourmet bakery called Love & Quiches overcame poorly integrated applications and the limitations of spreadsheets for record management. Learn how the ERP system Love & Quiches adopted afforded them compliance efficiencies, improved forecasting, and more.
Posted: 08 Jul 2016 | Published: 31 Dec 2015


Oracle Audit Defense Management
sponsored by Miro Consulting, Inc.
WHITE PAPER: No one likes audits, but considering that 75% of software vendors believe that their customers don't manage their software license effectively, they're bound to happen. This white paper answers your questions about Oracle software audits, and provides 7 steps to successfully navigating through Oracle audit defense management.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Miro Consulting, Inc.

Establishing Energy as Enterprise Currency
sponsored by Infor
WHITE PAPER: Access this white paper to learn how you can minimize costs and risks of managing energy costs using certain best practices as well as enterprise asset management technology.
Posted: 06 Jul 2016 | Published: 31 Dec 2012

Infor

Breakthrough Security and Compliance Practices for the Digital Enterprise
sponsored by BMC
WHITE PAPER: A comprehensive, aggressive automation strategy helps to sustain a high level of security and compliance. Discover ways to make automation a strategic asset in the fight against cyberthreats.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

BMC

What Does Employee Scheduling Have to Do with Employee Costs?
sponsored by Kronos Incorporated
WHITE PAPER: Misjudgments in employee scheduling can directly impact your labor costs, productivity, and profitability. This white paper provides a look at a scheduling tool that automates tasks, enabling you to align labor with demand, control costs, and meet compliance requirements in an accurate and timely fashion.
Posted: 30 Jun 2016 | Published: 31 Dec 2014

Kronos Incorporated

Connected Health Cloud (CHC)
sponsored by CloudMine
WHITE PAPER: In this resource we identify the 3 major hurdles to predictive, personalized healthcare, and how the industry itself can overcome them.
Posted: 29 Jun 2016 | Published: 29 Feb 2016


Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: A comprehensive managed file transfer solution provides off-the-shelf integration with common security products and end-to-end visibility into and monitoring of file transfers. It will help you ensure the rapid onboarding of new customers and partners, as well as governing interactions with trading partners.
Posted: 20 Jun 2016 | Published: 01 May 2016

Axway

4 Steps to Effectively Managing Risk and Compliance for Financial Services
sponsored by IBM
WHITE PAPER: Learn why convergence is key to maximizing governance efforts, and discover the 4 steps financial services organizations can take to mitigate compliance risks.
Posted: 22 Jul 2016 | Published: 31 May 2011

IBM

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire
1 - 25 of 332 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement