Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices White Papers (View All Report Types)
26 - 50 of 368 Matches Previous Page  |  Next Page
Lose Paper and Gain Compliance with Digitized Mortgage Origination
sponsored by Nuance
WHITE PAPER: This white paper explores how to transform the mortgage origination process into a faster, more compliant, and better customer experience. Learn the benefits you will reap by eliminating the risks of using paper and digitizing all required documents in mortgage lending.
Posted: 08 May 2015 | Published: 31 Dec 2014

Nuance

Why Document Management Is the Strategic Weapon SMBs Need to Succeed
sponsored by OpenText
WHITE PAPER: This brief white paper conveys the benefits SMBs are poised to reap from a new wave of document management features and functionalities. Learn to conquer that mountain of documents with improved user experience, enhanced search capabilities, expanded inelligence through judicious use of metadata, and more.
Posted: 06 May 2015 | Published: 06 May 2015

OpenText

Information Governance in Federal Agencies
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, discover a 4 step plan for designing, managing, and retaining an information governance program to firm up security and gain granular control over data.
Posted: 06 May 2015 | Published: 24 Feb 2014

Hewlett-Packard Company

Overcome Compliance Obstacles for Better Decision-Making
sponsored by SAS
WHITE PAPER: Learn how to keep your enterprise data in compliance while receiving support in; managing data for decision making, monitoring model risk and performance, implementing models with cost-effective automation and providing reconciliation between risk and finance.
Posted: 04 May 2015 | Published: 05 May 2015

SAS

Document Storage: 7 Must-Have Features for Superior Performance
sponsored by Actuate
WHITE PAPER: Organizations that produce high-volume customer communications must employ electronic archives to securely store content. This white paper lays out performance-enhancing features found in state-of-the-art enterprise document storage systems. Discover performance-enhancing features all archives should possess.
Posted: 01 May 2015 | Published: 01 May 2015

Actuate

Best Practices in ECM Document Migration
sponsored by Actuate
WHITE PAPER: This white paper assures that the challenges of document migration don't have to outweigh the benefits. Use this resource to determine if your organization is quickly and effectively transferring documents, and whether or not you're experiencing its advantages.
Posted: 01 May 2015 | Published: 01 May 2015

Actuate

Reduce Risk Through Information Sharing
sponsored by SAS
WHITE PAPER: This white paper examines the emergence of fusion centers, or information sharing agencies. Explore the ways in which an effective strategy enables collaborative information sharing.
Posted: 01 May 2015 | Published: 31 Dec 2014

SAS

Too Relaxed About Stress Testing
sponsored by SAS
WHITE PAPER: This infographic reveals startling statistics about different banks' stress testing strategies. Use this resource to determine where your organizations stands in comparison, and what a comprehensive stress testing plan can do for you.
Posted: 01 May 2015 | Published: 31 Dec 2014

SAS

Big Data Analytics: Safety in the Digital Era
sponsored by SAS
WHITE PAPER: Cybercriminals cause a lot of damage. They destroy profits, erode customers' trust, and compromise safety. This white paper identifies the ways in which big data analytics improve online safety and security. Read on and explore the efficacy of big data analytics when faced with fraudsters.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

SAS

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER: Follow the evolution of HIPAA-HITECH regulations over the past few years, learn why compliance is more important than ever before, and gain knowledge on how to avoid violations inside this resource.
Posted: 29 Apr 2015 | Published: 31 Dec 2013

Absolute Software

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: Ensure endpoint IT compliance processes are properly implemented and enforced by following 7 key steps, presented inside. Examine three recent data breaches directly related to stolen or misplaced devices, the consequences of them, and how to avoid these within your organization.
Posted: 29 Apr 2015 | Published: 19 Jan 2015

Absolute Software

The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines IT's complex dichotomy of document protection versus access in the mobile age, while issuing the consequences of inadequate security. Read on to ensure that your organization is avoiding the business issues that impact the information security management of corporate documents and content.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

IntraLinks, Inc

How Privileged Activity Monitoring Streamlines Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives suggestions for how you can use privileged activity monitoring to simplify your audit creation , particularly when it comes to ISO compliance.
Posted: 24 Apr 2015 | Published: 24 Feb 2014

BalaBit

The Elephant in the Room: What Vendors Are Hiding about Communications Security
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses why communications vendors don't discuss their products' security and shows you how you can ensure safety, compliance and reliability in all your business communications.
Posted: 22 Apr 2015 | Published: 31 Mar 2014

8x8, Inc.

Make the Impossible Possible: Simplifying ISO Compliance
sponsored by BalaBit
WHITE PAPER: This white paper gives some helpful guidelines for compliance by laying out the steps necessary for complying with the latest revision of ISO.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

BalaBit

PCIDSS Compliance and Privileged Access Monitoring
sponsored by BalaBit
WHITE PAPER: This white paper explores how to control and audit data access on servers, networking devices, and virtualized applications and ensure PCI compliance.
Posted: 21 Apr 2015 | Published: 24 Feb 2014

BalaBit

When Retention Schedules Shouldn't Live Up to their Name
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you understand how retention schedules have unintentionally misled companies into keeping unneeded data. Learn why taking the leap to get rid of excess information is a solid way to govern it, lessen risk, and save money.
Posted: 19 Apr 2015 | Published: 20 Apr 2015

Iron Mountain

How to Determine Proper Protocol for ROT
sponsored by Iron Mountain
WHITE PAPER: This white paper offers recommendations for consolidating your Redundant, Obsolete and Trivial content (ROT.) Learn the importance of deleting electronic records after suitable retention periods, and how doing so yields multiple benefits.
Posted: 19 Apr 2015 | Published: 31 Dec 2014

Iron Mountain

Implementing a Proactive Strategy For Data Security
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to implement a proactive data security strategy using a 5 step approach. Access now and discover how to overcome data security struggles and use people and processes to enhance technology solutions.
Posted: 17 Apr 2015 | Published: 17 Sep 2014

IBM

Addressing HACCP Issues Within the Food and Beverage Industry Using ERP Software
sponsored by IFS
WHITE PAPER: Learn how your organization can put in place a system to comply with HACCP guidelines in this white paper. Uncover the importance of an effective ERP system in compliance for the purposes of gathering, tracking, and reporting functionality.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

IFS

Could HIPAA Make Criminals Out of People You Know?
sponsored by 8x8, Inc.
WHITE PAPER: This white paper teaches you how to evaluate telecom providers for storing important data such as faxes, voicemail, and other PHI. View now to learn when to trust an organization as an associate and when to realize red flags are being raised.
Posted: 17 Apr 2015 | Published: 18 Aug 2014

8x8, Inc.

Mobile Management Compliance Checklist in Financial Services
sponsored by BlackBerry
WHITE PAPER: This white paper provides you with the essential questions to ask when evaluating an EMM solution and how to ensure compliance.
Posted: 14 Apr 2015 | Published: 04 Dec 2014

BlackBerry

Internet System for Tracking Over-Prescribing (I-Stop) FAQ
sponsored by Imprivata
WHITE PAPER: Access this white paper to find out about frequently asked questions regarding software that tracks over-prescribing. Read on to learn more about the laws and regulations, software and data requirements, and more.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

Researchers Confirm: Collaboration Strategies Bring a "Suite" of Solutions
sponsored by Microsoft
WHITE PAPER: Decision-makers won't want to miss this study on the effects of pragmatic teamwork solutions. Access now, and better understand the benefits, costs, and risks associated with a collaboration implementation. Business technology consultants have laid out quantifiable assets to be gained, inclusive of several key business areas.
Posted: 10 Apr 2015 | Published: 31 Oct 2014

Microsoft

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper outlines the 5 steps to achieving PCI compliance and security harmony.  View now to learn more.
Posted: 10 Apr 2015 | Published: 06 Oct 2014

Bit9 + Carbon Black
26 - 50 of 368 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement