Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices White Papers (View All Report Types)
26 - 50 of 286 Matches Previous Page  |  Next Page
The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines IT's complex dichotomy of document protection versus access in the mobile age, while issuing the consequences of inadequate security. Read on to ensure that your organization is avoiding the business issues that impact the information security management of corporate documents and content.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

IntraLinks, Inc

Addressing HACCP Issues Within the Food and Beverage Industry Using ERP Software
sponsored by IFS
WHITE PAPER: Learn how your organization can put in place a system to comply with HACCP guidelines in this white paper. Uncover the importance of an effective ERP system in compliance for the purposes of gathering, tracking, and reporting functionality.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

IFS

Could HIPAA Make Criminals Out of People You Know?
sponsored by 8x8, Inc.
WHITE PAPER: This white paper teaches you how to evaluate telecom providers for storing important data such as faxes, voicemail, and other PHI. View now to learn when to trust an organization as an associate and when to realize red flags are being raised.
Posted: 17 Apr 2015 | Published: 18 Aug 2014

8x8, Inc.

Mobile Management Compliance Checklist in Financial Services
sponsored by BlackBerry
WHITE PAPER: This white paper provides you with the essential questions to ask when evaluating an EMM solution and how to ensure compliance.
Posted: 14 Apr 2015 | Published: 04 Dec 2014

BlackBerry

Navigating the Legal and Compliance Implications of BYOD
sponsored by Dropbox for Business
WHITE PAPER: This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.
Posted: 30 Mar 2015 | Published: 04 Dec 2013

Dropbox for Business

Financial Services: Modern Big Data Architectures
sponsored by Red Hat
WHITE PAPER: Know your customer (KYC) policies and practices that are part of the response to anti-money laundering (AML) are becoming critical in meeting requirements of the US Patriot Act. Read this technology overview to learn about a solution for KYC and AML compliance.
Posted: 09 Mar 2015 | Published: 31 Jan 2015

Red Hat

Managing Food Safety and Quality Using Enterprise Software
sponsored by IFS
WHITE PAPER: Access this white paper to learn how to get a solid grip on process manufacturing with the use of software.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

IFS

ERP For DCAA Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about compliance requirements for working with the Department of Defense and determine whether your ERP software is up to the necessary standards.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

4 ERP Tips For FIAR Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about what it means to be in FIAR compliance and get 4 ERP tips that can help attain auditability for your business.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

The Effectiveness of a SIEM System According to IT Professionals
sponsored by IBM
WHITE PAPER: The following document profiles how IT professionals rate one possible SIEM solution.
Posted: 05 Feb 2015 | Published: 28 Feb 2014

IBM

Email Security Checklist: Eight Steps for Success
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

The Top Five Email Archiving Challenges
sponsored by Commvault
WHITE PAPER: This white paper explores how organizations can solve the top 5 challenges of email archiving. It also explains how a next-generation archive can simplify eDiscover and compliance, enable cloud strategies, and more.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Commvault

Compliance and Cost: Boost your PDF Protocol
sponsored by Nuance
WHITE PAPER: This brief white paper highlights technologies that enhance PDF production. Access this resource and uncover 13 advantages to leveraging this essential collaboration format.
Posted: 29 May 2015 | Published: 31 Dec 2014

Nuance

The Adobe EchoSign advantage for media and entertainment
sponsored by Adobe EchoSign
WHITE PAPER: Access this white paper for information about e-signatures in the media sector.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Adobe EchoSign

The Adobe EchoSign advantage for financial services
sponsored by Adobe EchoSign
WHITE PAPER: E-signatures offer financial institutions sustainable competitive advantages while meeting high industry standards. Access this white paper to learn more.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Adobe EchoSign

Best practice guide:What it takes to deliver a single view of the customer
sponsored by IPL
WHITE PAPER: This white paper intends to provide the reader with insight into how to ease the burden of compliance, become more customer-centric, offer improved products and services and make better-informed decisions by creating a single view of your most important information. Access now and learn how to enable these benefits in your own business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

IPL

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM
26 - 50 of 286 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement