IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
1 - 25 of 583 Matches Previous Page  |  Next Page
Office 365: Trust, Security, and Compliance
sponsored by Microsoft UK
WHITE PAPER: In this research report, learn about the framework Microsoft has constructed for their Office 365 environment to address compliance, privacy, and security concerns. Learn about the Office 365 Trust Center, where you can learn more about 365's security protocols, explore why a holistic approach to Office adoption may be the best course, and more.
Posted: 28 Apr 2017 | Published: 08 May 2015

Microsoft UK

RACQ: Audit Scare Led to Software Cost Containment Drive
sponsored by Snow Software
CASE STUDY: Read on to analyze how one software asset management (SAM) tool empowers organizations to strategically manage, optimize and contain software costs—taking the guesswork out of understanding license positions, and enabling businesses to respond to renewals and audits promptly.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Snow Software

Why Dimesion Data hosts SAP on Cisco Intelligent Infrastructure
sponsored by Cisco Systems, Inc.
VIDEO: You need an intelligent infrastructure so that your organization is prepared to respond to rapidly changing business needs at a moment's notice. Watch this video to learn about an infrastructure service that updates automatically alongside SAP policies to keep you secure, compliant, and up-to-date.
Posted: 13 Apr 2017 | Premiered: 13 Apr 2017

Cisco Systems, Inc.

Compliance and Beyond: Future-Proofing Your Password Policy
sponsored by Specops Software
WHITE PAPER: This white paper digs down into a variety of password security best practices to determine which established methods are still relevant. Learn how to improve password management with new best practices designed for modern compliance.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Specops Software

Invisible Documents: A Serious Risk to Enterprise Content Management (ECM)
sponsored by Microsoft
WHITE PAPER: Learn about invisible documents and how to tackle the challenge they represent with technologies like optical character recognition (OCR). Discover how to take enterprise content management (ECM) to the next level and remedy compliance issues before they can negatively impact your business.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

Microsoft

Why The Changing Nature of Beneficial Ownership Compliance is Important to You
sponsored by BAE Systems
WHITE PAPER: Use this white paper to learn the importance of managing and reporting your company's beneficial owners, as well as some initial steps you can take towards achieving beneficial ownership compliance.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PRESENTATION TRANSCRIPT: Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Citrix and Pure Storage

Connect Operations Across Your Food and Beverage Enterprise
sponsored by Sage Software
EBOOK: Discover a tool designed to meet the needs of those in the food and beverage industry but can be adopted for any business. It brings together all of your critical data—reducing the inefficiencies of running discrete supply chain, manufacturing, and financial systems. Then, read on to learn how 4 companies improved their global operations.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Sage Software

Best Practices for E-Discovery and Regulatory Compliance
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This Osterman Research white paper offers some best practices for how organizations can meet compliance requirements using Office 365. Find out how integrating 3rd party programs can build compliance capabilities in environments that operate in both Microsoft and non-Microsoft programs.
Posted: 28 Nov 2016 | Published: 30 Sep 2016

Proofpoint, Inc.

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

ERP for Drilling Contractors
sponsored by IFS
WHITE PAPER: Discover how an integrated value chain as part of your ERP software can give your drilling industry organization greater visibility, control, performance, and accountability.
Posted: 10 Feb 2016 | Published: 31 Dec 2013

IFS

ERP for Asset-Intensive Industries: How Integrated EAM and Project Management Drives Value
sponsored by IFS
WHITE PAPER: In this white paper you will learn why a consistent asset records and better master data are essential components in any EAM or project management systems. Jump to page 5 to learn how these factors may help your organization to stay in compliance.
Posted: 10 Feb 2016 | Published: 30 Sep 2015

IFS

Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by SearchCompliance.com
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

SearchCompliance.com

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

GRC Strategies for the Digital Business
sponsored by SearchCompliance.com
EBOOK: Digitization has become a fact life for businesses, but the increased data volumes and associated information security risk puts a strain on digital governance, risk and compliance resources. In this SearchCompliance handbook, learn how companies are adapting GRC budgeting and strategic processes to keep up with the speed of digital business.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

SearchCompliance.com

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

How to Create a Successful Data Archiving Strategy
sponsored by ArcMail Technology
EGUIDE: This e-guide uncovers the technical tools and processes you should look into for an effective data archiving strategy. Access now to discover the benefits a successful data strategy can bring to your enterprise, including reduced backup windows, knowledge retention, improved system performance, and more.
Posted: 06 May 2016 | Published: 04 May 2016

ArcMail Technology

Beyond BYOD: How IoT and new tech is changing modern GRC
sponsored by SearchCompliance.com
EBOOK: As the IoT continues to gain popularity, capitalizing on its business benefits require big changes to companies' GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data management, security and compliance processes, and strategies to take full business advantage of IoT data.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

SearchCompliance.com

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

The Top 5 Tasks to Automate for Privileged Account Management and Security
sponsored by Thycotic
WHITE PAPER: In this white paper, you will discover the top 5 tasks to automate for privileged account management. Access this paper to keep up with the scale and scope of the networks and systems your IT must manage.
Posted: 22 Jan 2016 | Published: 31 Dec 2015

Thycotic
1 - 25 of 583 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement