IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
226 - 250 of 606 Matches Previous Page  | Next Page
How to Save Money and Reduce Risks in Records Management
sponsored by Iron Mountain
WHITE PAPER: As the number of digital records continues to grow, legacy records management strategies are no longer practical, causing inconsistent implementation of policies. Read this paper to learn how SharePoint technology in conjunction with an innovative collaboration tool can help to create and implement consistent, compliant records management policies.
Posted: 12 Dec 2012 | Published: 12 Dec 2012

Iron Mountain

Where is the smart money going in ICT ?
sponsored by ComputerWeekly.com
WHITE PAPER: Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment.
Posted: 29 Nov 2012 | Published: 24 Mar 2011

ComputerWeekly.com

Making Strategic Use of Tape and Cloud Technologies for Offsite Data Protection
sponsored by Iron Mountain
WHITE PAPER: This paper explains the necessary reassessment of the ways your company uses and stores data in order to create an effective storage strategy that encompasses your backup, recovery and archiving operations. Learn how to best make a new storage strategy and to explore a new idea: Optimizing off-site data with tape and cloud support.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Iron Mountain

Rethinking your Enterprise Security: Critical Priorities to Consider
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, explore a sustainable approach to security designed to address the latest generation of vulnerabilities spawned from today's IT trends. Read on to access four keys to establish end-to-end security and five critical security priorities you must be aware of.
Posted: 28 Sep 2012 | Published: 31 May 2012

Hewlett-Packard Limited

Information governance: Reduce risk and improve compliance
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Iron Mountain

Survive the Scrutiny of Litigation:Rediscover Records Management
sponsored by Iron Mountain
EBOOK: Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management.
Posted: 28 Aug 2012 | Published: 27 Aug 2012

Iron Mountain

Iron Mountain Customers Share Compliance, Litigation and Discovery Best Practices
sponsored by Iron Mountain
WHITE PAPER: This paper showcases how customers of the world's largest records management consulting practice address their own compliance and discovery requirements with the help of this company's intellectual property, practical advice and best practices. Read on to access short testimonials and descriptions of the services available.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

Case Study: The Push For Simple, Cost-effective PCI Compliance
sponsored by Dell SecureWorks UK
WHITE PAPER: To avoid fines and meet an upcoming compliance deadline, call centre services provider, RESPONSE (Building Rewarding Relationships), needed to improve security. Read this paper to learn how the organisation secured an easily installed and managed security solution that could also be deployed in time to meet the looming deadline.
Posted: 18 Jul 2012 | Published: 16 Jul 2012

Dell SecureWorks UK

SANS Analyst Report: The Risks with Mobility and BYOD
sponsored by Hewlett-Packard Limited
WHITE PAPER: Businesses are migrating to a more mobile environment. Individuals use mobile apps and devices are used for both personal and business reasons. With today's workforce relying on mobility and apps, they can create a riskier environment for valuable information.
Posted: 16 Jul 2012 | Published: 30 Mar 2012

Hewlett-Packard Limited

Five Areas of Records and Information Management Best Practices
sponsored by Iron Mountain
WHITE PAPER: More than 73% of CIOs, general counsel and records managers surveyed in a recent compliance benchmark study indicated they do not proactively monitor their records program for compliance. Out of 4,000 respondents, 42% have no formal information security program and 61% struggle with discovery. Where does your company’s policy fall?
Posted: 21 Jun 2012 | Published: 20 Jun 2012

Iron Mountain

Four DLP Best Practices To Enhance Security
sponsored by Lumension
EGUIDE: Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

Lumension

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by McAfee, Inc.
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

McAfee, Inc.

Comparing Email Archiving Software with General Archiving Software
sponsored by Symantec Corporation
EGUIDE: Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation

Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by McAfee, Inc.
EGUIDE: This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

McAfee, Inc.

Archiving in the Cloud: Essential Tips and Questions to Answer
sponsored by Symantec Corporation
EGUIDE: Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation

Email archiving FAQ
sponsored by Symantec Corporation
EGUIDE: This exclusive FAQ guide has expert answers to 6 email archiving questions and addresses topics like the pros and cons of managed email archiving services, bandwidth requirements and more.
Posted: 19 Nov 2012 | Published: 19 Nov 2012

Symantec Corporation

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

Business-Driven Identity and Access Management: Why This New Approach Matters
sponsored by Aveksa
WHITE PAPER: This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

Aveksa

Provisioning Should Be Simple Why Traditional Provisioning Systems Are No Longer Relevant
sponsored by Aveksa
PRESENTATION TRANSCRIPT: Do you want to improve your provisioning system? In the past provisioning has been expensive and ineffective, but that can all improve with a few changes. Deciding who has access to your business enterprise is one of the first steps to take towards improvement.
Posted: 24 Jul 2012 | Published: 23 Jul 2012

Aveksa

Vendor Landscape: Security Information & Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

LogRhythm, Inc.

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
sponsored by Dell Software
WHITE PAPER: This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities.
Posted: 23 Jul 2012 | Published: 31 Dec 2011

Dell Software

Making Office 365 More Secure and Compliant
sponsored by Dell Software
WHITE PAPER: This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Dell Software
226 - 250 of 606 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement