IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
226 - 250 of 601 Matches Previous Page  |  Next Page
Effective print security for SMBs
sponsored by
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Security as a Service: Benefits and Risks of Cloud-Based Security
sponsored by
EGUIDE: Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

Mobile: The Technology Game-Changer in 2013
sponsored by
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

Total Quality Assurance for Businesses with a Global Business Plan
sponsored by IFS
WHITE PAPER: Establishing a business that is competitive on a global spectrum can be challenging. View this white paper to learn more about how you can deploy a complete quality assurance package that provides the support your business needs. It outlines what you should be looking for in a source so you can be certain you've made the right selection.
Posted: 18 Feb 2013 | Published: 18 Feb 2013


Four DLP Best Practices To Enhance Security
sponsored by
EGUIDE: Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Where is the smart money going in ICT ?
sponsored by
WHITE PAPER: Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment.
Posted: 29 Nov 2012 | Published: 24 Mar 2011

McAfee Tackles the Complexities of Endpoint Security
sponsored by Intel Security
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

Intel Security

State of the Data Center Survey
sponsored by Symantec Corporation
WHITE PAPER: Examine the results from a recent survey with IT execs around the globe to uncover the latest techniques your peers are utilizing to tackle today's increasingly complex IT environments and modernize their IT strategies to effectively leverage today's emerging technologies.
Posted: 31 May 2013 | Published: 31 May 2013

Symantec Corporation

Using Predictive Coding to Your E-Discovery Advantage
sponsored by
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT: In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013

SailPoint Technologies

Threat Detection (Antivirus Intrusion Prevention)
sponsored by
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

May Information Security Magazine
sponsored by
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012


Mitigating the Risks of IT Change
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.
Posted: 19 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.

IT Handbook: Getting Over the Cloud Adoption Hurdle
sponsored by
EGUIDE: This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

Managing Threat in a Digital Age
sponsored by IBM
WHITE PAPER: Access this comprehensive paper about managing threats in the modern, digital age to learn why security has become a C-suite priority, and find insight into various types of threats and uncover the three biggest steps execs should take toward building "security intelligence."
Posted: 08 Mar 2013 | Published: 31 Aug 2011


Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE: This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
sponsored by IBM and SI Architects
EGUIDE: In this expert E-Guide from, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Cloud Costs and Management Considerations
sponsored by CSC
EGUIDE: This expert E-Guide provides considerations you should keep in mind when moving to the cloud – especially when it comes to security and risk tolerance – and offers expert advice on how to foster cloud adoption in your enterprise.
Posted: 24 Jan 2013 | Published: 24 Jan 2013


Tips for Creating a HIPAA-Friendly BYOD Policy
sponsored by HP & Intel®
EGUIDE: This e-guide from provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

HP & Intel®

HIPAA Compliance Takes Patient, Employee and Vendor Followup
sponsored by HP & Intel®
EGUIDE: This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

HP & Intel®

Sustainability: From Strategic Objective to Compliance Operation
sponsored by HP & Intel®
EGUIDE: This e-guide from offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

HP & Intel®

Put Compliance Management Back into Server Virtualization
sponsored by HP & Intel®
EGUIDE: This e-guide from offers expert insight that will help ensure your business remains compliant before, during and after any server virtualization implementation. Read now to learn how you can put compliance management back into server virtualization.
Posted: 12 Dec 2012 | Published: 12 Dec 2012

HP & Intel®

Comparing Email Archiving Software with General Archiving Software
sponsored by Symantec Corporation
EGUIDE: Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation
226 - 250 of 601 Matches Previous Page    8 9 10 11 12 13    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement