IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
201 - 225 of 621 Matches Previous Page  | Next Page
Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous
sponsored by Iron Mountain
WHITE PAPER: This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy.
Posted: 12 Jul 2013 | Published: 31 May 2013

Iron Mountain

SharePoint® and E-Discovery Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, uncover how and what you need to preserve from your SharePoint environment for efficient recovery and litigation readiness. Learning objectives include understanding why SharePoint data archiving should be part of litigation readiness planning, how to reduce e-discovery risk, how to minimize recovery times and more.
Posted: 09 Jul 2013 | Premiered: 09 Jul 2013

SearchCompliance.com

Using Predictive Coding to Your E-Discovery Advantage
sponsored by SearchCIO.com
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

SearchCIO.com

May Information Security Magazine
sponsored by SearchSecurity.com
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

SearchSecurity.com

Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Recordkeeping Needs Assessment Case Study: Using the Cloud to Improve Dismal Scores
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom explores the methodology used to conduct an early Generally Accepted Recordkeeping Principles® needs assessment (N.A.), followed by a discussion of how the N.A. led to the selection of a Cloud provider to improve dismal scores.
Posted: 02 Apr 2013 | Premiered: 02 Apr 2013


Building A Powerful IM Strategy for Large Organizations
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: Large organizations face challenges in identifying and defining requirements for the implementation of information management strategies. This classroom will lead you through Enbridge Inc.'s journey - from understanding business risks and gaining executive support, to elaborating, staffing, and implementing measureable execution techniques.
Posted: 01 Apr 2013 | Premiered: 02 Apr 2013


The E-discovery Ostrich
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights four simple steps that will ensure your organization is ready for e-discovery. Learn what a failure to plan for an e-discovery mandate can really cost your business, and discover why a little foresight can go a long way toward peace of mind.
Posted: 25 Mar 2013 | Published: 25 Mar 2013

Iron Mountain

Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

How to Comply with the HIPAA Security Rule
sponsored by Thawte Inc.
EGUIDE: In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Thawte Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AlienVault
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AlienVault

How Can Content-Aware IAM give me the Security I need to Confidently Move My Business Forward
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a comprehensive and scalable solution for managing user identities, access and information use.
Posted: 11 Jul 2013 | Published: 31 Oct 2012

CA Technologies.

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
sponsored by More Direct
EGUIDE: This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

More Direct

5 Backup Features to Ensure Compliance
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com

Where BCDR and GRC Come Together: A CIO's Guide
sponsored by Essextec
EZINE: In this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

Network Security 2.0: A Systems Approach to Threat Mitigation Augments Defense in Depth
sponsored by Cisco Systems, Inc.
WHITE PAPER: In the first edition of a six part series on Network Security sponsored by Cisco Systems, security architecture is the focus. Specifically covered is a systems approach that builds on IT security investment using System Management for policy, reputation and identity.
Posted: 07 Jun 2013 | Published: 28 May 2008

Cisco Systems, Inc.

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

McAfee, Inc.

State of the Data Center Survey
sponsored by Symantec Corporation
WHITE PAPER: Examine the results from a recent survey with IT execs around the globe to uncover the latest techniques your peers are utilizing to tackle today's increasingly complex IT environments and modernize their IT strategies to effectively leverage today's emerging technologies.
Posted: 31 May 2013 | Published: 31 May 2013

Symantec Corporation

Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT: In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013

SailPoint Technologies

Threat Detection (Antivirus Intrusion Prevention)
sponsored by SearchSecurity.com
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Mitigating the Risks of IT Change
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.
Posted: 19 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.

Managing Threat in a Digital Age
sponsored by IBM
WHITE PAPER: Access this comprehensive paper about managing threats in the modern, digital age to learn why security has become a C-suite priority, and find insight into various types of threats and uncover the three biggest steps execs should take toward building "security intelligence."
Posted: 08 Mar 2013 | Published: 31 Aug 2011

IBM
201 - 225 of 621 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement