IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
151 - 175 of 613 Matches Previous Page  | Next Page
Don't Let Automation Pass You By
sponsored by N-able Technologies
WHITE PAPER: This white paper provides essential information that every managed service provider (MSP) needs to know when it comes to remote monitoring and management (RMM) automation software.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

N-able Technologies

Mapping Security for your Virtual Environment
sponsored by Hewlett-Packard Company
WHITE PAPER: Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
Posted: 25 Sep 2013 | Published: 31 May 2012

Hewlett-Packard Company

Keep Cloud Compliant
sponsored by SearchCompliance.com
EBOOK: Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchCompliance.com

Endpoint Security Management (Antimalware Technologies) Technical Guide
sponsored by SearchSecurity.com
EGUIDE: This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months.
Posted: 12 Sep 2013 | Published: 11 Sep 2013

SearchSecurity.com

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Key Considerations for Big Data Security Analytics SIEM 2.0
sponsored by LogRhythm, Inc.
WEBCAST: This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future.
Posted: 05 Sep 2013 | Premiered: Feb 6, 2013

LogRhythm, Inc.

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This white paper helps break down multiple security information and event management (SIEM) vendor details for your convenience and assistance in finding the right one for your business.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

LogRhythm, Inc.

Ease GLBA Compliance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Security Intelligence: Ensure Compliance, Optimize Performance, Boost Security
sponsored by LogRhythm, Inc.
WEBCAST: Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization.
Posted: 03 Sep 2013 | Premiered: Sep 3, 2013

LogRhythm, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
ANALYST REPORT: This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs.
Posted: 03 Sep 2013 | Published: 07 May 2013

LogRhythm, Inc.

PCI and PA DSS Compliance Assurance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs.
Posted: 03 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Identify and Destroy: Your Two-Step Ticket to Easier Information Compliance
sponsored by Iron Mountain
WHITE PAPER: This brief white paper provides a two-step ticket to easier information compliance. Discover three steps to speed and recovery and how to identify and destroy data that is no longer relevant to your business needs.
Posted: 30 Aug 2013 | Published: 16 Jun 2013

Iron Mountain

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Driving Maximum Business Value From Records and Information Management
sponsored by Iron Mountain
EBOOK: Check out this exclusive eBook to explore today's new era of records and information management.
Posted: 09 Aug 2013 | Published: 09 Aug 2013

Iron Mountain

Crafting a Secure Approach to Mobility and Compliance
sponsored by SearchConsumerization.com
EBOOK: This expert resource discusses key security features that need to be addressed when creating an effective mobile strategy, including how you can ensure compliance. Read on and learn about crucial topics such as encryption, data protection, and mobile application management.
Posted: 25 Sep 2013 | Published: 25 Sep 2013


Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett-Packard Company
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett-Packard Company

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
sponsored by Intel
EGUIDE: This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life.
Posted: 18 Sep 2013 | Published: 18 Sep 2013

Intel

Select the Right Solution for Endpoint Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

US Foods avoids potential software license penalties with self audit
sponsored by IBM
CASE STUDY: This white paper features an endpoint management system that boosts audit compliance and security through an all-inclusive system.
Posted: 09 Sep 2013 | Published: 30 Apr 2013

IBM

Computer Weekly special report: Mobile device management and the importance of absolute compliance
sponsored by BlackBerry
WHITE PAPER: Ensuring regulatory compliance can be difficult when dealing with an influx of mobile devices, but it's still critical. Learn how to create a bring-your-own-device, or BYOD, policy that will keep your organisation completely compliant.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

BlackBerry

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

MOBILE HEALTH TRENDS 2013: BYOD HERE TO STAY
sponsored by HP & Intel®
EBOOK: This expert handbook takes an in-depth look at the latest BYOD and mobile trends that organizations are adopting, examining the common problems that CIOs and IT are facing and what you can do to best overcome them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

HP & Intel®
151 - 175 of 613 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement