IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
226 - 250 of 599 Matches Previous Page  |  Next Page
Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Security as a Service: Benefits and Risks of Cloud-Based Security
sponsored by SearchSecurity.com
EGUIDE: Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

SearchSecurity.com

Mobile: The Technology Game-Changer in 2013
sponsored by SearchSecurity.com
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Total Quality Assurance for Businesses with a Global Business Plan
sponsored by IFS
WHITE PAPER: Establishing a business that is competitive on a global spectrum can be challenging. View this white paper to learn more about how you can deploy a complete quality assurance package that provides the support your business needs. It outlines what you should be looking for in a source so you can be certain you've made the right selection.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

IFS

Addressing Changes in the Healthcare IT Legislative and Regulatory Environment
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper focuses on major advances in cloud client computing solutions supported by Virtual Desktop Infrastructure (VDI), and how these technologies can address the challenges facing health care providers by providing a more flexible, integrated, and virtualized IT environment.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Dell, Inc. and Intel®

Four DLP Best Practices To Enhance Security
sponsored by SearchSecurity.com
EGUIDE: Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

SearchSecurity.com

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Where is the smart money going in ICT ?
sponsored by ComputerWeekly.com
WHITE PAPER: Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment.
Posted: 29 Nov 2012 | Published: 24 Mar 2011

ComputerWeekly.com

Threat Detection (Antivirus Intrusion Prevention)
sponsored by SearchSecurity.com
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

May Information Security Magazine
sponsored by SearchSecurity.com
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

SearchSecurity.com

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Mitigating the Risks of IT Change
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.
Posted: 19 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.

IT Handbook: Getting Over the Cloud Adoption Hurdle
sponsored by SearchCloudComputing.com
EGUIDE: This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchCloudComputing.com

Managing Threat in a Digital Age
sponsored by IBM
WHITE PAPER: Access this comprehensive paper about managing threats in the modern, digital age to learn why security has become a C-suite priority, and find insight into various types of threats and uncover the three biggest steps execs should take toward building "security intelligence."
Posted: 08 Mar 2013 | Published: 31 Aug 2011

IBM

Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE: This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
sponsored by IBM and SI Architects
EGUIDE: In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Cloud Costs and Management Considerations
sponsored by CSC
EGUIDE: This expert E-Guide provides considerations you should keep in mind when moving to the cloud – especially when it comes to security and risk tolerance – and offers expert advice on how to foster cloud adoption in your enterprise.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

CSC

Tips for Creating a HIPAA-Friendly BYOD Policy
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

HP & Intel®

HIPAA Compliance Takes Patient, Employee and Vendor Followup
sponsored by HP & Intel®
EGUIDE: This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

HP & Intel®

Sustainability: From Strategic Objective to Compliance Operation
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchCompliance.com offers 3 lessons learned regarding compliance departments' responsibility to comply with green initiatives that haven't evolved as quickly as the business has. Inside, learn how to closely monitor compliance operation conditions that affect corporate strategy and balance resources with operational capacity.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

HP & Intel®

Put Compliance Management Back into Server Virtualization
sponsored by HP & Intel®
EGUIDE: This e-guide from searchCompliance.com offers expert insight that will help ensure your business remains compliant before, during and after any server virtualization implementation. Read now to learn how you can put compliance management back into server virtualization.
Posted: 12 Dec 2012 | Published: 12 Dec 2012

HP & Intel®

Comparing Email Archiving Software with General Archiving Software
sponsored by Symantec Corporation
EGUIDE: Compare email-specific archiving solutions to general archiving products in this expert E-Guide featuring Brien Posey, backup expert. Read on to learn how these techs differ, which is better for eDiscovery and check out the pros and cons of all-in-one packages vs. individual apps for each task.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation

Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by Intel Security
EGUIDE: This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Intel Security

Archiving in the Cloud: Essential Tips and Questions to Answer
sponsored by Symantec Corporation
EGUIDE: Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation

Email archiving FAQ
sponsored by Symantec Corporation
EGUIDE: This exclusive FAQ guide has expert answers to 6 email archiving questions and addresses topics like the pros and cons of managed email archiving services, bandwidth requirements and more.
Posted: 19 Nov 2012 | Published: 19 Nov 2012

Symantec Corporation
226 - 250 of 599 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement