IT Management  >   Systems Operations  >  

IT Compliance

RSS Feed    Add to Google    Add to My Yahoo!
IT ComplianceWhite Papers (View All Report Types)
 
Balancing Data Protection and Compliance in the Cloud
sponsored by CipherCloud
WHITE PAPER: This white paper outlines a cloud-based solution that helps organizations stick to compliance requirements, and offers reliable data protection in the cloud.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CipherCloud

In the Age of BYOD, How Do You Secure the Workforce?
sponsored by Imation Corp.
WHITE PAPER: In this white paper, explore the impact of the BYOD trend by implementing this strategy within your own business.
Posted: 12 Sep 2014 | Published: 31 Dec 2013

Imation Corp.

Take Control of Your PST Problem
sponsored by Dell Software
WHITE PAPER: Read this tech brief to find out how Dell Migration Manger can help you alleviate administrative and compliance challenges created by an abundance of PST files on employee desktops.
Posted: 06 May 2014 | Published: 07 May 2013

Dell Software

Why You Can't Ignore Endpoint Backup Protection (TechTarget)
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Meet Licensing and Security Challenges With Software Asset Management
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

Promise Healthcare case study
sponsored by Dell Software
WHITE PAPER: Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.
Posted: 20 Aug 2014 | Published: 01 Apr 2014

Dell Software

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement