IT Management  >   Systems Operations  >  

IT Compliance

RSS Feed    Add to Google    Add to My Yahoo!
IT ComplianceWhite Papers (View All Report Types)
 
Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks UK

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Automate, Monitor, and Improve Your Compliance Procedures
sponsored by Interneer, Inc.
WHITE PAPER: This white paper explores the benefits of automating compliance procedures. It also highlights a solution that delivers this automation as well as monitoring capabilities.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

Interneer, Inc.

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper uncovers the various aspects of governance, risk, and compliance (GRC), and offers key advice on how to build a platform that will help organizations improve overall operations.
Posted: 28 Apr 2014 | Published: 31 Oct 2013

CommVault Systems, Inc.

Manage Identity and Access for Continuous Compliance and Reduced Risk
sponsored by IBM
WHITE PAPER: This valuable resource shows how policy-driven IAM governance will protect assets from unauthorized access without diminishing productivity.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

A Step-by-Step Survival Guide to Data Protection
sponsored by Druva Software
WHITE PAPER: This white paper provides step-by-step advice on how organizations can protect their corporate data from threats like lost devices and eDiscovery issues.
Posted: 16 May 2014 | Published: 30 Apr 2014

Druva Software

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

Why Investing in Specialty Healthcare Applications Enables Clinical Workflow Improvements
sponsored by GE
WHITE PAPER: This resource offers 5 FAQs on how specialty applications can add value to healthcare workflows in an age where EMRs can leave potential gaps in clinician delivery, documentation, finances, and compliance.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

GE
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement