IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
1 - 25 of 653 Matches Previous Page  | Next Page
Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, explore several best practises that should be implemented to support workforce mobility.
Posted: 24 Jul 2014 | Published: 31 Dec 2013

FrontRange Solutions Inc.

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even with mobile devices. Read on to learn about the government's relationship with healthcare providers, as well as insight for securing devices to protect sensitive data.
Posted: 24 Jul 2014 | Published: 24 Jul 2014

BlackBerry

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
sponsored by AlienVault
WEBCAST: This practical session covers strategies to help you take the pain out of PCI DSS reporting.
Posted: 24 Jul 2014 | Premiered: Jul 24, 2014

AlienVault

Evaluating Cloud-Based Archiving for Compliance
sponsored by HP Autonomy
WHITE PAPER: This expert e-guide will teach you how to handle cloud-based archiving and compliance concerns
Posted: 24 Jul 2014 | Published: 24 Jul 2014

HP Autonomy

Bringing Software Licenses into Compliance
sponsored by CDW Corporation
VIDEO: This video case study covers how one hospital group dealt with a self-audit request when they did not know if their software licensing was compliant.
Posted: 21 Jul 2014 | Premiered: 17 Apr 2014

CDW Corporation

Automate, Monitor, and Improve Your Compliance Procedures
sponsored by Interneer, Inc.
WHITE PAPER: This white paper explores the benefits of automating compliance procedures. It also highlights a solution that delivers this automation as well as monitoring capabilities.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

Interneer, Inc.

Rogue IT on the Rise? SAM Strategies and Tools
sponsored by CDW Corporation
VIDEO: This exclusive video covers the need for software asset management to control end users during the rise of rogue IT.
Posted: 17 Jul 2014 | Premiered: 18 Apr 2014

CDW Corporation

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains how a GRC platform can transform how an organization operates – internally, externally and legally. It explains how a suitable platform enables better, faster decision making, creating a more competitive organization.
Posted: 15 Jul 2014 | Published: 17 Apr 2014

CommVault Systems, Inc.

Compliance in the Cloud
sponsored by Alert Logic
EGUIDE: This expert e-guide introduces 5 simple tips to help improve your enterprise's threat and vulnerability management program.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Alert Logic

Providing a single source for secure identity solutions
sponsored by HID
WHITE PAPER: Access this white paper to find 6 product lines that provide a foundation for multi-layered security, as well as several key benefits of having complete access control for your organization.
Posted: 11 Jul 2014 | Published: 05 Dec 2012

HID

2014 Gartner Magic Quadrant for Web Application Firewalls
sponsored by Imperva
ANALYST REPORT: Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Tackling the CFO Innovation Challenge
sponsored by Perceptive Software
WHITE PAPER: Find out how CFO's are providing innovative solutions while focusing on best in class operational excellence.
Posted: 10 Jul 2014 | Published: 31 Jul 2013

Perceptive Software

Enterprise Universal Access One secure credential for logical, physical, local and remote access
sponsored by HID
WHITE PAPER: This white paper explores leading solutions designed to create successful enterprise authentication.
Posted: 09 Jul 2014 | Published: 19 Sep 2013

HID

The Apple-ization of the Enterprise: Understanding IT’s New World
sponsored by Code42
WHITE PAPER: Access this white paper to learn about a new set of tools and applications that can help you keep your end-users happy while also satisfying the demands of senior management and auditors. It's time to stop fighting the "Apple-ization of the Enterprise" and start enjoying the benefits that this trend can deliver.
Posted: 08 Jul 2014 | Published: 07 Jul 2014

Code42

Enterprise Mobility: A Checklist for Secure Containerization
sponsored by Code42
WHITE PAPER: Containerization is a security method that separates enterprise applications and data from personal applications and data. This white paper explains the pros and cons of various approaches to containerization.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Posted: 07 Jul 2014 | Published: 28 Feb 2011

Veracode, Inc.

Streamline Compliance with Cloud-based Application Security
sponsored by Veracode, Inc.
DATA SHEET: This white paper introduces a cloud-based application security platform that assesses mobile, web, and third-party applications for standard controls and ensures compliance with OX, HIPAA, NIST 800-53, MAS, and other mandates.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Veracode, Inc.

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

City of Manchester Solves Personal Storage File Problems
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how the city of Manchester, New Hampshire went about solving their personal storage file problem.
Posted: 07 Jul 2014 | Published: 10 Jul 2013

C2C Systems

3-Phase Clinical Content Archive Strategy
sponsored by Perceptive Software
WHITE PAPER: This white paper explains how the "Walk-Run-Fly" strategy can help healthcare organizations use VNA to effectively manage content.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Perceptive Software

Protecting Digitalized Assets in Healthcare: Which Managed File Transfer Deployment Model is Right for You?
sponsored by GlobalScape
WHITE PAPER: Learn what types of policies and tools can be implemented to secure valuable healthcare data.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of a backup solution built to handle the requirements of volume, mobility and compliance in a more streamlined and cost-effective way.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Code42

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com
1 - 25 of 653 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement