IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
26 - 50 of 715 Matches Previous Page  | Next Page
Living with open source software
sponsored by Hewlett-Packard Company
VIDEOCAST: This expert webcast highlights the risks of open source code in software projects, and explains why applications are vulnerable to attack from the moment they go live on the internet.
Posted: 07 Oct 2014 | Premiered: Sep 29, 2014

Hewlett-Packard Company

Continuous Monitoring for Data Access and Sensitive Information
sponsored by IBM
WHITE PAPER: This white paper highlights a simple, robust solution that assures the security and integrity of data in several environments, such as big data platforms.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

Protect your SAP data environment with IBM InfoSphere Guardium
sponsored by IBM
BROCHURE: This white paper highlights a solution that allows you to build a database security platform that meets the challenges of the SAP data environment.
Posted: 06 Oct 2014 | Published: 31 Oct 2012

IBM

IBM Infosphere Guardium Vulnerability Assessment
sponsored by IBM
DATA SHEET: This resource highlights a vulnerability assessment solution that scans database infrastructures on a scheduled basis to detect vulnerabilities.
Posted: 06 Oct 2014 | Published: 30 Apr 2014

IBM

IBM InfoSphere Guardium for federal information systems
sponsored by IBM
DATA SHEET: This data sheet explains how continuous monitoring can secure sensitive data and simplify SCAP compliance validation.
Posted: 03 Oct 2014 | Published: 30 Apr 2013

IBM

IT Governance and Compliance Strategies for the CIO
sponsored by Box
EGUIDE: This expert e-guide offers advice for how CIO's can ensure their IT governance and compliance strategies are successful, and discover what technologies are available to mitigate compliance problems.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Box

IT Compliance FAQ Guide
sponsored by Box
EGUIDE: In this expert e-guide, examine some frequently asked questions with respect to GRC and IT compliance including important frameworks, who is affected and more.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Box

Proactively Address Regulatory Compliance Requirements and Protect Sensitive Data in Real Time
sponsored by IBM
WHITE PAPER: Learn how Hadoop is helping companies like yours tame big data, and uncover the data security and compliance concerns that accompany it.
Posted: 02 Oct 2014 | Published: 30 Apr 2013

IBM

Security Compliance:  A Common Thread
sponsored by CDW Corporation
RESOURCE: Access this infographic to discover how to properly secure your information and meet major compliance mandates for healthcare, finance and government data.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

CDW Corporation

Tracking Data Assets in the Cloud Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this Information Governance Symposium classroom, Jeffrey Ritter discusses often overlooked business issues when moving operations to the cloud, and presents key strategies for using cloud-based services that also comply with the dynamic demands of e-discovery.
Posted: 01 Oct 2014 | Premiered: 03 Oct 2014

SearchCompliance.com

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett-Packard Company

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Six Reasons VDI + Data Protection Can Strengthen Your Security Posture
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover six reasons VDI and data protection can strengthen your security posture as a whole.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Digital Guardian

Intermedia's Email Archiving
sponsored by Insight
WHITE PAPER: Read this white paper to get details on an email archiving solution that makes it easy to preserve, protect, and recover your email.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Insight

Top 10 email archiving features you shouldn't live without
sponsored by Insight
WHITE PAPER: Read this whitepaper for a list of ten things to look for in an archiving provider.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Insight

IBM Infosphere Data Privacy for Hadoop
sponsored by IBM
WHITE PAPER: Find out about the IBM InfoSphere Data Privacy for Hadoop which can help businesses like you build confidence in big data.
Posted: 29 Sep 2014 | Published: 31 Jan 2014

IBM

The Story Behind The PCI Data Security Standard 3.0
sponsored by CDW Corporation
WEBCAST: This webcast reveals how PCI DSS has changed and several ways to manage compliance.
Posted: 29 Sep 2014 | Premiered: May 30, 2014

CDW Corporation

Balancing Data Protection and Compliance in the Cloud
sponsored by CipherCloud
WHITE PAPER: This white paper outlines a cloud-based solution that helps organizations stick to compliance requirements, and offers reliable data protection in the cloud.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CipherCloud

The Time to Optimize ERP is Now
sponsored by Automic
WHITE PAPER: Find out what new ways to meet demand CIOs and application and operations teams are considering in order to facilitate growth, agility and maintain compliance during a time of the Internet of Things.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Automic

How Effective is Cloud-Provided Encryption?
sponsored by CipherCloud
RESOURCE: This blog post points out the issues surrounding cloud-provided encryption, and outlines why not all solutions are created equal.
Posted: 25 Sep 2014 | Published: 22 Jul 2014

CipherCloud

When 'Secure enough' isn't enough
sponsored by Imation Corp.
WHITE PAPER: This white paper explains the reason why compliance alone may not be enough to provide the security you need to prevent data breaches from occurring.
Posted: 24 Sep 2014 | Published: 01 Feb 2013

Imation Corp.

Key IT Influencers in the Banking, Finance, and Insurance Industries in 2014
sponsored by Sungard
WHITE PAPER: Written in conjunction with industry leaders across Banking, Finance, and Insurance, the BFI Key Influencers Report sets out to promote conversation on the future of IT by talking to those industry professionals who help to shape it.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Why a Comprehensive Data Management Platform Supersedes the Data Integration Toolbox
sponsored by SAS
WHITE PAPER: Find out how a toolbox of data integration tools and technologies, including the data warehouse, can help your business resolve the issues around managing, governing and utilizing big data.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

SAS

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud
26 - 50 of 715 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement