IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
1 - 25 of 600 Matches Previous Page  |  Next Page
Stay in Compliance: Clinical Standards Data Management
sponsored by Cambridge Semantics
VIDEO: In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

Using Metadata Wisely to Mitigate Risk and Uncover Opportunities
sponsored by Veritas
RESOURCE CENTER: Click through now to learn how your organization can use metadata to mitigate risk and uncover business opportunities.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Veritas

Four Steps to Readily Achievable Web Accessibility
sponsored by Cryptzone
WHITE PAPER: This white paper outlines how to easily implement a strategy for complying with Web Accessibility. Read on to learn about the advantages of this strategy.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Cryptzone

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Managing Information Security and Compliance in SharePoint and Office 365
sponsored by Cryptzone
RESOURCE: This resource outlines a platform that lets you identify risks, establish a security strategy, and design policies for Sharepoint with ease. Read on to learn about the different features of this program including encryption, classification, access restriction, and more.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Cryptzone

Using Automation to Solve Data Management Challenges
sponsored by Veritas
RESOURCE CENTER: This brief article discusses the benefits of implementing automated policy management to simplify data management. Read on to learn how you can save money and alleviate your data management inefficiencies through automated processes, such as backup and archiving, data de-duplication, and more.
Posted: 29 Jan 2016 | Published: 31 Dec 2014

Veritas

Understand the Basics of Performance-Driven Licensing
sponsored by VMTurbo
WHITE PAPER: Access this e-book to learn five common virtualization scenarios that break compliance. You'll also discover tactics currently being used in attempt to maintain compliance and how performance-driven compliance offers a solution to control workloads performance while mitigating compliance risk.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

VMTurbo

Licensing, Compliance & Audits in the Cloud Era
sponsored by VMTurbo
RESEARCH CONTENT: The survey presented in this resource was designed to investigate the challenges organizations face when maintaining software licensing compliance in today's rapidly-growing scale-out virtualized and cloud environments. Read on to learn the strategies organizations used to meet these challenges and how they compare to one another side-by-side.
Posted: 28 Jan 2016 | Published: 30 Nov 2015

VMTurbo

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage, and learn how to automate SSH key management, compliance reporting, and more.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic

Data Governance in the Big Data World
sponsored by Trillium Software
WHITE PAPER: In this paper you will uncover the impact of new paradigms on data governance and consider how data governance and data quality solutions are adapting to meet the requirements of this new age of big data. Download now to learn more.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Trillium Software

Amaya Gaming Experiences Smarter Development and Reduces Compliance Headache
sponsored by Splunk
CASE STUDY: Discover how global gaming company Amaya was able to eliminate compliance challenges, gain critical insights in to development and performance, and improve DevOps collaboration with the help of one system.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Splunk

Checklist: Revenue Cycle Management Pain Points
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: In this white paper uncover 13 critical questions to help you determine if your revenue cycle management (RCM) process is under control, plus tips on what to look for in RCM services and how to select the right vendor for your healthcare organization.
Posted: 14 Jan 2016 | Published: 14 Jan 2016

Allscripts Healthcare Solutions

Is It Time For a Change In Your Revenue Cycle Operations?
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: Discover how you can tackle common revenue cycle management challenges in healthcare by adopting a system that can optimize your revenue cycle operations and achieve superior results with strategic flexibility, scalability, TCO reduction, regulatory compliance and more.
Posted: 14 Jan 2016 | Published: 14 Jan 2016

Allscripts Healthcare Solutions

Special Report: The Risks of Shadow Data
sponsored by Elastica
WHITE PAPER: Based on the analysis of over 63 million documents, this report on shadow data provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Elastica

The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by SearchCompliance.com
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

SearchCompliance.com

Data Privacy In The Cloud: Five Current Issues in Compliance
sponsored by OpenText
WHITE PAPER: This in-depth resource can help you navigate compliance laws around the world and adhere to even the most complex regulations in your cloud environment.
Posted: 03 Dec 2015 | Published: 31 May 2015

OpenText

How to Protect Your Healthcare Communications in a World of Security and Compliance Threats
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses how you can maintain security and compliance, especially in an area of healthcare IT that's frequently overlooked: Communications.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

8x8, Inc.

Security and Performance in One Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Cloud Collaboration Ensures Compliance, Flight Safety
sponsored by Microsoft
WHITE PAPER: This case study explores how an air navigation service provider they designed a mobile cloud app for their document review process to ensure better compliance, collaboration, and flight safety.
Posted: 11 Nov 2015 | Published: 31 Mar 2015

Microsoft

Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Intel Security Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology, and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Posted: 23 Oct 2015 | Published: 20 Jul 2015

Intel Security

Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015

IBM

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software
1 - 25 of 600 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement