IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
26 - 50 of 621 Matches Previous Page  | Next Page
Discovery & Compliance Archiving: Email Storage That Fulfills Your Legal Requirements
sponsored by Apptix
WHITE PAPER: This whitepaper details a cloud-based email archiving solution that is both cost-effective and compliant.
Posted: 14 Apr 2014 | Published: 16 Apr 2013

Apptix

The Economic and Productivity Impact of IT Security on Healthcare
sponsored by Imprivata
WHITE PAPER: This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations.
Posted: 11 Apr 2014 | Published: 31 May 2013

Imprivata

Imprivata Cortext: HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: This white paper reveals the top 2 best practices to ensure secure, HIPAA-compliant text messaging for the healthcare industry.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

Imprivata

Endpoint Security Compliance: Top 19 Questions Auditors Ask
sponsored by Lumension
WEBCAST: This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time.
Posted: 11 Apr 2014 | Premiered: Apr 11, 2014

Lumension

Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
sponsored by Imprivata
WHITE PAPER: This case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
Posted: 10 Apr 2014 | Published: 28 Feb 2010

Imprivata

Proven, Trusted and HIPAA-Compliant Media Management
sponsored by Iron Mountain
WHITE PAPER: This resource features a media management partner that offers security and compliance tools for your tape backup and archive to ensure you consistently are up to par with the latest HIPAA updates.
Posted: 10 Apr 2014 | Published: 23 Oct 2013

Iron Mountain

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

The CISO's Guide to a Full Night's Sleep
sponsored by EMC Corporation
WHITE PAPER: This resource shows the damages that can be caused by data breaches and audits and highlights an identity and access management solution that mitigates risk and ensures compliance.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

EMC Corporation

Solving SIEM Problems with Security Analytics
sponsored by EMC Corporation
WHITE PAPER: The status quo approach of collecting more logs from more sources won't help in detecting and responding to advanced threats. Logs are inherently limited in the level security visibility that they provide. Consider a new way of looking at SIEM.
Posted: 10 Apr 2014 | Published: 31 Jan 2013

EMC Corporation

Records Management Implications of The Affordable Care Act
sponsored by Iron Mountain
WHITE PAPER: This white paper explores the implications of major regulations updates being made due to the Accordable Care Act (ACA) to healthcare records management in 2014.
Posted: 10 Apr 2014 | Published: 07 Nov 2013

Iron Mountain

What You Should Know About HIPPA and The Omnibus Final Rule
sponsored by Iron Mountain
WHITE PAPER: This resource explains the latest changes in HIPAA with the Omnibus Final Rule, and offers industry-leading advice on how to ensure compliance.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

Iron Mountain

Confidential Collaboration: How to manage regulatory compliance & data privacy while keeping your data safe
sponsored by IntraLinks, Inc
WHITE PAPER: This resource offers 4 key recommendations on how to maintain regulatory compliance while using collaborative processes.
Posted: 09 Apr 2014 | Published: 31 Oct 2013

IntraLinks, Inc

Survey Reveals 5 Common Myths about EMR Transition & Enterprise-wide Information Governance
sponsored by Iron Mountain
WHITE PAPER: This comprehensive white paper lists the top 5 myths about electronic medical record (EMR) transition and information governance, and reveals the truth behind each.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Iron Mountain

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals
sponsored by Imprivata
WHITE PAPER: This resource features a collection of 20 tips from your healthcare peers on how to successfully implement single sign-on (SSO) and strong authentication solutions.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Imprivata

Handling Security in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks UK

The Cloud Provider Prescription To Prevent HIPAA Headaches
sponsored by INetU Inc.
WHITE PAPER: This valuable whitepaper looks at how IT can handle answering the new mandate that holds them directly accountable to HIPPA.
Posted: 02 Apr 2014 | Published: 10 Apr 2013

INetU Inc.

The Dynamic Duo: SAM & Security
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Trends Shaping Software Management: 2014
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers the importance of addressing application compatibility and license agreements when dealing with the BYOD trend.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Software Asset Management: Pay Attention or Pay Up
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

Software Asset Management: Pay Attention or Pay Up
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

HANDLE YOUR ACHIVE DATA CONFIDENTLY AND COST-EFFECTIVELY
sponsored by Iron Mountain
BROCHURE: This brochure talks about the benefits of an archival tape management solution that can make handling requests for archive data easy and quicker while also reducing costs.
Posted: 01 Apr 2014 | Published: 31 Dec 2013

Iron Mountain

Comprehensive Cloud Security Requires an Automated Approach
sponsored by CloudPassage
WEBCAST: This webcast highlights major cloud security challenges and offers best practices to alleviate each issue. Click through to learn how automation may be your key to security success.
Posted: 31 Mar 2014 | Premiered: Nov 12, 2013

CloudPassage
26 - 50 of 621 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement