IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
1 - 25 of 651 Matches Previous Page  |  Next Page
Case Study: Global Bank Achieves Regulatory Compliance
sponsored by OpenText
WHITE PAPER: Access this case study to discover how a Fortune 500 bank easily ensured accessibility compliance without tearing its attention away from other compliance or security concerns.
Posted: 25 Nov 2015 | Published: 25 Nov 2015


Best Practices for Maintaining a Secure Enterprise
sponsored by MASERGY
EGUIDE: Access this guide for essential information on security threats, compliance concerns, and the best practices you need to adopt to overcome them.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


The Role of Third-Party Tools for Office 365 Compliance
sponsored by Good Technology
WHITE PAPER: This white paper explores the compliance challenges and limitations in Office 365. Access this exclusive paper to enhance your compliance capabilities with several third-party tools like containerized mobility, data residency protection, and more.
Posted: 24 Nov 2015 | Published: 30 Jun 2015

Good Technology

How to Protect Your Healthcare Communications in a World of Security and Compliance Threats
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses how you can maintain security and compliance, especially in an area of healthcare IT that's frequently overlooked: Communications.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

8x8, Inc.

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software

Stealth Compliance Strategies
sponsored by Unisys
WHITE PAPER: Access this guide to find software-defined security strategies that help government and commercial enterprises prevent highly sensitive data, systems, and intellectual property from being compromised.
Posted: 20 Nov 2015 | Published: 30 Jun 2015


Modernizing Your Active Directory Environment
sponsored by Dell Software
WHITE PAPER: Access this white paper and find out how legacy active directory (AD) structures can be updated to accommodate changes in technology. Discover top areas in which AD modernization should occur, and the benefits of updating each one.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Dell Software

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: This white paper describes five steps SMBs can take to implement and maintain PCI DSS compliance with minimal complications.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Data Theft Prevention for Healthcare
sponsored by Raytheon|Websense
WHITE PAPER: This white paper outlines a data-centric approach to protecting data and staying in compliance without sacrificing efficient patient care.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Enterprise Data Quality: Achieve Maximum Value from Your Business-Critical Apps
sponsored by Oracle Corporation
WHITE PAPER: Discover how you can solve common data quality problems, achieve maximum value from your business-critical applications, and deliver fit-for-purpose data to your business end users.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Oracle Corporation

Protect Your Intellectual Property and Customer Data From Theft and Abuse
sponsored by TITUS
WHITE PAPER: This Forrester report shows you how to take an effective and holistic approach to data security in today's challenging environment.
Posted: 13 Nov 2015 | Published: 10 Jul 2015


Special Report: Audit Fees in 2015
sponsored by Workiva
WHITE PAPER: Access this report for insight into how you can manage your security auditing process in the most efficient and cost-effective manner possible.
Posted: 12 Nov 2015 | Published: 31 Oct 2015


Security and Performance in One Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Keeping Air Traffic Controllers Informed with a Cloud-Based Compliance Application
sponsored by Microsoft
WHITE PAPER: In this white paper, learn how NAC CANADA was able to streamline compliance by automating a necessary, but mostly manual and paper-based read-and-acknowledge process. Read on to learn about the cloud platform they chose, and the benefits it provided.
Posted: 11 Nov 2015 | Published: 31 Mar 2015


From Checkboxes to Frameworks: CISO Insights on Moving From Compliance to Risk-Based Cyber-Security Programs
sponsored by IBM
WHITE PAPER: Access this report to discover three common struggles experienced by CISOs, as well as a five-step program designed to improve your cyber-security strategy.
Posted: 09 Nov 2015 | Published: 30 Oct 2015


Data Privacy in the Cloud
sponsored by OpenText
WHITE PAPER: This white paper can help you navigate the complexities of international data privacy laws and cloud computing.
Posted: 03 Nov 2015 | Published: 02 Nov 2015


Stopping Cybercrime: A Guide for the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper contains a list of best practices financial institutions can follow to ensure that they remain secure in the face of growing cyber-attacks.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

LogRhythm, Inc.

Critical Capabilities for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology, and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Posted: 23 Oct 2015 | Published: 20 Jul 2015

Intel Security

Special Report: The Success of Electronic Communications Compliance
sponsored by Smarsh
WHITE PAPER: In this report, over one hundred compliance professionals were asked how their organizations are approaching communications compliance and what their greatest challenges are.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015


Don't Let PCI Compliance Get in the Way of Productivity
sponsored by Unisys
WHITE PAPER: Most businesses struggle to maintain payment card industry (PCI) compliance while also enabling business efficiency. This white paper can help you find that balance.
Posted: 15 Oct 2015 | Published: 15 Oct 2015


A Guide to Email Retention and UK Compliance Laws
sponsored by Barracuda Networks Inc.
WHITE PAPER: This white paper provides a guide to email retention and compliance laws in the UK. Read on to learn how you should be archiving data so that you can avoid legal complications in the future.
Posted: 14 Oct 2015 | Published: 14 Oct 2015

Barracuda Networks Inc.

PCI Compliance For Dummies
sponsored by Qualys
WHITE PAPER: Every organization that deals with cardholder data must contend with PCI DSS compliance, and this resource can help you do so without wasting time or facing complexities.
Posted: 14 Oct 2015 | Published: 31 Dec 2011

1 - 25 of 651 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement