Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Compliance (Law)

RSS Feed    Add to Google    Add to My Yahoo!
Compliance (Law) Reports
 
After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013

SearchSecurity.com

Web Application Firewalls: Patching, SDLC Key for Security, Compliance
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY: This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013

Ipswitch File Transfer

Records management strategies to maintain regulatory compliance
sponsored by SearchCompliance.com
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

SearchCompliance.com

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

Controlling the Cost of File Transfers
sponsored by Attachmate Corporation
WHITE PAPER: View this resource to learn about a family of managed solutions that can help you meet the file transfer needs of your enterprise without the costly, resource-hungry investment of a homegrown solution.
Posted: 09 Apr 2013 | Published: 31 Dec 2010

Attachmate Corporation

How Web Security Improves Productivity and Compliance
sponsored by Webroot
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 30 May 2013 | Published: 31 Dec 2012

Webroot

October 2013 Health IT E-Zine
sponsored by SearchHealthIT.com
EZINE: In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

SearchHealthIT.com

Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

ComputerWeekly.com

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit
sponsored by Attachmate Corporation
CASE STUDY: This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!
Posted: 09 Apr 2013 | Published: 30 Mar 2012

Attachmate Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement