IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
1 - 25 of 652 Matches Previous Page  |  Next Page
Safeguard Enterprise Compliance and Remain Vigilant Against Threats
sponsored by IBM
WEBCAST: In this webcast, learn how one security platform is streamlining and simplifying mainframe security maintenance.
Posted: 27 Feb 2015 | Premiered: Jan 7, 2015

IBM

Quick Guide to HIPAA Contingency Plan Compliance with Recovery-as-a-Service
sponsored by Bluelock
WHITE PAPER: View this informative white paper that explains how recovery-as-a-service (RaaS) can help ensure vital data and systems persist indefinitely, and can be rapidly recovered and brought back to a production state.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Bluelock

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

Streamlining Security Identity Governance
sponsored by IBM
WHITE PAPER: Access this white paper to discover a business-centric approach to identity access and compliance that improves security and helps reduce costs for managing accounts, groups, credentials, and other access rights.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

[Security Identity Governance: Reduce Risk and Comply with Regulations
sponsored by IBM
WHITE PAPER: Access this white paper to discover how to effectively manage identities and application access while bringing together business operations and IT. Read on to learn how to bridge the gaps across compliance, and how this can reduce the risk of fraud, human error, and more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Discover the Latest Features for SharePlex 8.6
sponsored by Dell Software
VIDEO: This video explains the newest features of SharePlex 8.6, a major release that is a high speed log-based replication.
Posted: 24 Feb 2015 | Premiered: 07 Jan 2015

Dell Software

Delivering user-centric IT solutions that improve workplace productivity
sponsored by Unisys
WHITE PAPER: Access this white paper to discover how workspace-as-a-service is an end-to-end solution to enable the journey from a traditional, device-centric landscape to a future-proof, user-centric landscape and allowing organizations to assemble the best-fit working environment and applications for each user on any device they choose.
Posted: 24 Feb 2015 | Published: 31 Dec 2014


Strategies to Avoid Hidden Cost of Sales Tax Compliance
sponsored by Avalara
WHITE PAPER: Access the following report to uncover the direct and indirect costs of managing sales and use tax compliance that your organization may be experiencing.
Posted: 20 Feb 2015 | Published: 31 Jan 2015

Avalara

Delve Into The Relationship Between Critical Security Controls and NAC
sponsored by ForeScout Technologies, Inc.
PRODUCT REVIEW: This white paper reveals how next-generation tools support many CSCs and what strategies are needed for successfully leveraging NAC to reduce risk, improve compliance, and meet key automation and integration requisites.
Posted: 18 Feb 2015 | Published: 31 Jan 2015

ForeScout Technologies, Inc.

ERP For DCAA Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about compliance requirements for working with the Department of Defense and determine whether your ERP software is up to the necessary standards.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

4 ERP Tips For FIAR Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about what it means to be in FIAR compliance and get 4 ERP tips that can help attain auditability for your business.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

Top Ten Reasons Cloud-based Archiving is Catching Fire
sponsored by Hewlett-Packard Limited
WHITE PAPER: Cloud-based archiving tools can help organizations lower risks and save money. Learn why and what else they offer.
Posted: 18 Feb 2015 | Published: 09 Jun 2014

Hewlett-Packard Limited

Have You Considered Desktop as a Service in the Cloud?
sponsored by NaviSite
WHITE PAPER: View this resource to investigate a particular desktop as a service provider that is cloud compatible.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

NaviSite

Manage structured data with intelligent archiving
sponsored by Hewlett-Packard Limited
WHITE PAPER: Learn more about how you can manage your structured data with intelligent archiving to reduce footprint storage cost and query time simply and easily.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Achieving Effective Information Governance: Cut Storage and Discovery Costs and Help Reduce Risk
sponsored by IBM
WHITE PAPER: Learn how you can achieve effective information governance to cut storage and discovery costs and help reduce risk.
Posted: 18 Feb 2015 | Published: 31 Oct 2014

IBM

Remedies for Compliant Communication and Collaboration in Healthcare Organizations
sponsored by Actiance
WHITE PAPER: Healthcare organizations should access this informative white paper to learn about the importance of keeping compliance regulations in mind when utilizing electronic communication, collaboration, and social networking tools.
Posted: 17 Feb 2015 | Published: 11 Jun 2014

Actiance

Collaboration and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: This white paper is an excellent resource for pharmaceutical companies weighing the benefits and risks of social media. Read on to learn what the pharmaceutical industry's regulatory landscape looks like, and which concerns you should be aware of from a legal perspective.
Posted: 17 Feb 2015 | Published: 11 Jul 2014

Actiance

Social Media Risks and Benefits for the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the push and pull that pharmaceutical companies feel between utilizing social networks to improve business results, and meeting the regulatory requirements of agencies like the FDA for the use of these networks.
Posted: 17 Feb 2015 | Published: 11 Jul 2014

Actiance

The Impact of New Communications in the Energy Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the use of instant messaging technology in the energy industry, explaining why monitoring, logging, and archiving these communications is a necessity for achieving compliance and protecting critical assets from cyberattacks.
Posted: 16 Feb 2015 | Published: 30 May 2014

Actiance

Gartner Identity & Access Management Summit 2015
sponsored by Gartner
EVENT: At Gartner Identity & Access Management Summit, taking place on March 16 & 17 in London, you'll gain the insight you need to address complex IAM issues. Click through now to register and view the full agenda and speaker line-up for the summit.
Posted: 13 Feb 2015 | Published: 16 Jan 2015

Gartner

Your CEO Just Lost His Laptop - Now What?
sponsored by Druva Software
WEBCAST: Access this webcast to learn about an endpoint backup program that protects data from loss, threats, allows for secure file sharing, and complies with eDiscovery. Tune into to learn about the importance of implementing an effective endpoint backup strategy now.
Posted: 13 Feb 2015 | Premiered: Feb 13, 2015

Druva Software

IT Policy Compliance for Dummies
sponsored by Qualys
WHITE PAPER: This free e-book explains everything you'll ever need to know about adhering to compliance rules.
Posted: 12 Feb 2015 | Published: 31 Dec 2010

Qualys

Navigating The Route To The Cloud
sponsored by Crayon Group
WHITE PAPER: Access this white paper to discover a service designed to put you in control of your company, and provide a clear roadmap to the cloud.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Crayon Group

Implement a Proactive Strategy for Data Security
sponsored by IBM
WHITE PAPER: Access this white paper to learn the 5 key findings of a recent Forrester study that evaluated data security decision-making by security buyers and influencers, and what it means to engage in proactive data security and privacy efforts.
Posted: 10 Feb 2015 | Published: 30 Sep 2014

IBM

The New Rules of Data Security: Best Practices to Secure Data and Ensure Compliance
sponsored by IBM
VIRTUAL ENVIRONMENT: This virtual environment contains 4 informative webcasts discussing the new rules of data security.
Posted: 09 Feb 2015 | Premiered: 29 Jan 2015

IBM
1 - 25 of 652 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement