Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FDA 21 CFR 11

RSS Feed    Add to Google    Add to My Yahoo!
FDA 21 CFR 11 White Papers (View All Report Types)
 
ERP Software Acquisition in an FDA Regulated Environment
sponsored by SoftBrands, Inc.
WHITE PAPER: This white paper presents a guideline to help you select an ERP system for your FDA validation. Explore a five phase software acquisition life cycle model to help you accomplish these objectives as efficiently as possible.
Posted: 06 Nov 2008 | Published: 12 Mar 2008

SoftBrands, Inc.

FlexNet and FDA 21 CFR Part 11
sponsored by Apriso Corporation
WHITE PAPER: Manufacturers regulated by the FDA 21 CFR Part 11 regulations understand that the integrity of manufacturing processes must be achieved and maintained in order to sustain compliance. The purpose of this document is to demonstrate that Apriso FlexNet platform and application suite can support the intent of the 21 CFR Part 11 regulatory guidelines.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Apriso Corporation

Controlling and Managing "Super User" Access
sponsored by One Identity
WHITE PAPER: Discover the risks associated with privileged accounts and tips on how to mitigate them quickly. Solve your privileged account management challenges by establishing checks and balances, controlling third-party access, safeguarding sensitive information and ensuring compliance, and more.
Posted: 19 Dec 2012 | Published: 31 Dec 2011

One Identity

Managing Food Safety and Quality Using Enterprise Software
sponsored by IFS
WHITE PAPER: Access this white paper to learn how to get a solid grip on process manufacturing with the use of software.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

IFS

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Ovum: Corporate eGRC update
sponsored by RSA
WHITE PAPER: This report explores the state of E-Governance, Risk and Compliance (eGRC), studying over 340 senior executives responsible for eGRC activities in their organization. View now to uncover key findings regarding the integration of eGRC activities, ownership of eGRC strategy, and drivers for eGRC activities today and in the future.
Posted: 29 Mar 2012 | Published: 01 Dec 2010

RSA

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by Commvault
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Commvault

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods
sponsored by Attachmate Corporation
WHITE PAPER: This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach.
Posted: 10 Apr 2013 | Published: 31 Dec 2012

Attachmate Corporation

The Role of Identity & Access Management in Achieving Continuous Compliance
sponsored by CA Technologies.
WHITE PAPER: A common requirement in many of today’s compliance mandates relate to the concept of knowing who users are, what applications and resource they have access to, and when they access them. In this paper, uncover how to maintain continuous compliance though a centralized and integrated identity and access management (IAM) platform.
Posted: 14 May 2012 | Published: 01 Feb 2012

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement