IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
1 - 25 of 613 Matches Previous Page  | Next Page
Improving Security with GRC Best Practices
sponsored by TechTarget
RESOURCE: Although they have many of the same goals, an organization's compliance and security departments usually do not work together enough to meet common objectives. Take this 2 minute survey and gain access to this eguide which outlines essential guidelines for improving security with governance, risk and compliance best practices.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

TechTarget

A Guide to Data Privacy for Business and IT Executives
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

IntraLinks, Inc

Top 10 Considerations when Selecting a Secure Text Messaging Solution
sponsored by TigerText, Inc.
WHITE PAPER: This resource offers tips on how to choose a text messaging vendor that offer secure and compliant functionality for use in the workplace.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

TigerText, Inc.

Take a Facts First Approach to E-Discovery
sponsored by Exterro
WHITE PAPER: This white paper delves into the e-discovery challenges faced by today's enterprises and provides practical steps for applying a "facts first" approach that both exceeds court expectations and reduces discovery costs.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

Exterro

Top 8 Secure Messaging Policy Best Practices
sponsored by TigerText, Inc.
WHITE PAPER: In this white paper, explore 8 valuable recommendations on how to develop a secure text messaging policy to ensure data security and compliance.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

TigerText, Inc.

Managing Complexity in Identity and Access Management
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013

RSA, The Security Division of EMC

Protecting Privacy in Cross-Border Litigation
sponsored by Exterro
WHITE PAPER: For U.S.-based, multinational organizations, privacy statutes in foreign nations have become a minefield. This paper discusses the importance of proactively managing the use of ESI based in foreign countries during e-discovery.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

The Case for GRC: Addressing the Top 10 GRC Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offers industry-leading advice on how to make the best investments in each of these areas.
Posted: 16 Apr 2014 | Published: 31 Dec 2012

RSA, The Security Division of EMC

Nine Steps to Smart Security for Small Businesses
sponsored by Qualys
WHITE PAPER: This white paper lists 9 steps to achieving smart security for small businesses and focuses on how a cloud security solution can benefit organizations without the resources for traditional security approaches.
Posted: 16 Apr 2014 | Published: 30 Dec 2011

Qualys

The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER: Access this resource to discover the benefits of cloud-based security, especially for small and medium-sized businesses (SMBs) who have fewer resources when mitigating increasing risks and compliance mandates.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Qualys

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

Seven Considerations for Achieving CJIS Compliance
sponsored by Imprivata
WHITE PAPER: This white paper features a security solution that helps you ensure the Criminal Justice Information Services (CJIS) compliance requirement for advanced authentication is met by your organization, effective on September 30, 2014.
Posted: 14 Apr 2014 | Published: 31 Oct 2013

Imprivata

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

Discovery & Compliance Archiving: Email Storage That Fulfills Your Legal Requirements
sponsored by Apptix
WHITE PAPER: This whitepaper details a cloud-based email archiving solution that is both cost-effective and compliant.
Posted: 14 Apr 2014 | Published: 16 Apr 2013

Apptix

The Economic and Productivity Impact of IT Security on Healthcare
sponsored by Imprivata
WHITE PAPER: This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations.
Posted: 11 Apr 2014 | Published: 31 May 2013

Imprivata

Imprivata Cortext: HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: This white paper reveals the top 2 best practices to ensure secure, HIPAA-compliant text messaging for the healthcare industry.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

Imprivata

Endpoint Security Compliance: Top 19 Questions Auditors Ask
sponsored by Lumension
WEBCAST: This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time.
Posted: 11 Apr 2014 | Premiered: Apr 11, 2014

Lumension

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Proven, Trusted and HIPAA-Compliant Media Management
sponsored by Iron Mountain
WHITE PAPER: This resource features a media management partner that offers security and compliance tools for your tape backup and archive to ensure you consistently are up to par with the latest HIPAA updates.
Posted: 10 Apr 2014 | Published: 23 Oct 2013

Iron Mountain

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

The CISO's Guide to a Full Night's Sleep
sponsored by EMC Corporation
WHITE PAPER: This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

EMC Corporation

Solving SIEM Problems with Security Analytics
sponsored by EMC Corporation
WHITE PAPER: The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Posted: 10 Apr 2014 | Published: 31 Jan 2013

EMC Corporation

Records Management Implications of The Affordable Care Act
sponsored by Iron Mountain
WHITE PAPER: This white paper explores the implications of major regulations updates being made due to the Accordable Care Act (ACA) to healthcare records management in 2014.
Posted: 10 Apr 2014 | Published: 07 Nov 2013

Iron Mountain

What You Should Know About HIPPA and The Omnibus Final Rule
sponsored by Iron Mountain
WHITE PAPER: This resource explains the latest changes in HIPAA with the Omnibus Final Rule, and offers industry-leading advice on how to ensure compliance.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

Iron Mountain
1 - 25 of 613 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement