IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
1 - 25 of 750 Matches Previous Page  | Next Page
Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

The Convergence of Security and Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This eBook defines potential compliance and security gaps; identifies what effect these gaps can have on your organization; and reveals how a positive solution can close these gaps to ensure the security of servers and endpoints, and help to ensure compliance with industry regulations.
Posted: 16 Dec 2014 | Published: 31 Jul 2014

Bit9, Inc.

A Positive Security Approach to PCI DSS 3.0 Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource sets out a roadmap to meeting the requirements of PCI DSS 3.0, helping you to break each step of the process down into manageable, easy-to-understand components.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Bit9, Inc.

eGuide: HIPAA Security & Compliance
sponsored by Bit9, Inc.
EGUIDE: In this e-Guide, information security consultant Kevin Beaver explains a number of practical steps that you can take today to not only meet HIPAA's compliance requirements, but also to make tangible improvements to your information security program as a whole.
Posted: 16 Dec 2014 | Published: 06 Nov 2014

Bit9, Inc.

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9, Inc.
WHITE PAPER: This helpful white paper outlines 5 steps for reducing the complexity of PCI assessments, lowering administration costs, and accelerating the attainment of a compliant and secure environment.
Posted: 16 Dec 2014 | Published: 16 Dec 2014

Bit9, Inc.

A Centralized Key Management Solution for Your Enterprise's Security Needs
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet KeySecure: A single, centralized platform for managing cryptographic content (keys and related data) and applications, capable of running in on premise, cloud, or hybrid environments.
Posted: 15 Dec 2014 | Published: 18 Jul 2014

SafeNet, Inc.

Protect Your Sensitive Data Without Weighting Down Your Networks
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Diary of a Healthcare CISO
sponsored by Core Security Technologies
WEBCAST: This exclusive webcast explores the most pressing challenges and security risks in the healthcare information security landscape today.
Posted: 15 Dec 2014 | Premiered: Dec 15, 2014

Core Security Technologies

Understanding PCI Mobile Payment Processing Security Guidelines
sponsored by Delego
EGUIDE: Download this expert e-guide now to learn about the new Payment Card Industry Mobile Payment Acceptance Security Guidelines and how they will impact you.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Delego

Sensitive Data Is Everywhere, So Data Protection Should Be, Too
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic helps you to think about where your data and keys are located and who has access to them, and also presents one company's data protection portfolio, which provides persistent protection of sensitive information at all critical points in its lifecycle.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013

SafeNet, Inc.

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

How to Build and Maintain a Secure Network
sponsored by Delego
WHITE PAPER: Download this informative whitepaper now for 12 chapters on how to navigate the PCI-DSS and stay in compliance while protecting your customer's information.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Delego

Attack Intelligence: The Key to Reducing Risk in Healthcare
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper will show how attack intelligence can help you stay in compliance with HIPAA when it comes to risk management.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

The Relationship Between Identity Management and Compliance
sponsored by ObserveIT
EGUIDE: This expert guide asks whether anomaly-based user activity monitoring is the only way to stop data breaches, and also explains how IAM should and shouldn't be used to support enterprise compliance processes.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

ObserveIT

IBM's Mission: Leave a Mark in the Enterprise Network Management Marketplace
sponsored by IBM
WHITE PAPER: In this resource, explore a network management solution that enables network managers and administrators to gain insight into the activity happening within their network with various tools and utilities.
Posted: 05 Dec 2014 | Published: 30 Nov 2012

IBM

4 Best Practices for Building PCI DSS Compliant Networks
sponsored by SolarWinds, Inc.
WHITE PAPER: This white paper reveals four recommendations for building PCI DSS compliant networks to secure consumer's payment card data.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

SolarWinds, Inc.

A SIEM Buyer’s Guide for Resourced-Constrained Security
sponsored by SolarWinds, Inc.
WHITE PAPER: Check out this buyer's guide to learn about the critical security and compliance capabilities that you need without breaking the bank on SIEM.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

SolarWinds, Inc.

CTERA Leading Global Advertising Agency Case Study
sponsored by CTERA Networks
WHITE PAPER: This resource describes how a global ad agency enabled cloud backup to replace expensive tape, help with compliance, and reduce TCO.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CTERA Networks

Identity and Access Management Guidelines
sponsored by ObserveIT
EGUIDE: In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

ObserveIT

Meet Global Trade Compliance Regulations While Improving Performance and Cost Savings
sponsored by Oracle Corporation UK Ltd
VIDEO: In this short video, medical device company Beckman Coulter's senior IT manager describes how Oracle Global Trade Management enabled the organization to meet global trade compliance regulations while realizing performance gains and cost savings.
Posted: 03 Dec 2014 | Premiered: 24 Feb 2014

Oracle Corporation UK Ltd

IDC White Paper: EMC Isilon Scale-Out Data Lake Foundation
sponsored by EMC Isilon
WHITE PAPER: Read this whitepaper to find out which capabilities are essential for building a Big Data infrastructure.
Posted: 02 Dec 2014 | Published: 31 Oct 2014

EMC Isilon

IT and Executive Perspective on ITaaS
sponsored by EMC
WHITE PAPER: This white paper details a survey that compares two competing perspectives on various IT topics.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

EMC

Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

How Supply Chain Convergence and Cloud Impact Global Trade Management Usage
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Find out how 170 global trade practitioners feel about their global trade management strategies, technology usage, investment plans and their attitudes toward cloud-based solutions and supply chain convergence.
Posted: 26 Nov 2014 | Published: 30 Sep 2014

Oracle Corporation UK Ltd
1 - 25 of 750 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement