IT Management  >   Systems Operations  >  

IT Compliance

RSS Feed    Add to Google    Add to My Yahoo!
IT Compliance White Papers (View All Report Types)
 
ERP For DCAA Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about compliance requirements for working with the Department of Defense and determine whether your ERP software is up to the necessary standards.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

Taking Charge of Security in a Hyperconnected World
sponsored by RSA
WHITE PAPER: Access this resource to uncover the top mistakes IT managers are making in their security strategies, and why they need a more continuous approach to improving defense systems in today's ever changing threat landscape.
Posted: 06 Dec 2013 | Published: 31 Oct 2013

RSA

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Mapping Security For Your Virtual Environment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this comprehensive white paper, explore the a solution to virtualization management solution that integrates with existing security strategies, offering simplified, efficient, and compliance-ready defense systems.
Posted: 15 Nov 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Cloud Collaboration Ensures Compliance, Flight Safety
sponsored by Microsoft
WHITE PAPER: This case study explores how an air navigation service provider they designed a mobile cloud app for their document review process to ensure better compliance, collaboration, and flight safety.
Posted: 11 Nov 2015 | Published: 31 Mar 2015

Microsoft

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Expert Strategies: How to Adapt to Social Media While Making Sure You Stay Compliant
sponsored by Bloomberg
WHITE PAPER: In this expert white paper, gain insight on how to successfully keep compliant while protecting your business from the potential risks associated with using social media as a business tool.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

Bloomberg
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement