IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
26 - 50 of 607 Matches Previous Page  |  Next Page
Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Intel Security Positioned in Leaders Quadrant of the Magic Quadrant for SIEM
sponsored by Intel Security
WHITE PAPER: Read this report to learn how Gartner's Magic Quadrant for SIEM can help you evaluate the market, technology, and service providers, and why McAfee Enterprise Security Manager (ESM) is positioned in the SIEM Leaders Quadrant.
Posted: 23 Oct 2015 | Published: 20 Jul 2015

Intel Security

Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Secure and Monitor Every Endpoint, Everywhere
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges of endpoint security and gives advice on monitoring and protecting all of your endpoints before, during and after a hack.
Posted: 19 Oct 2015 | Published: 31 Jul 2015

IBM

The Industry Standards Mystery: Learn What Industry Standards Mean for Your Business
sponsored by IBM
EBOOK: Although industry standards were designed to make business communications simpler, the specific and complex nature of the standards themselves can seem intimidating. In this eBook, readers can gain a more in-depth understanding of industry standards.
Posted: 24 Sep 2015 | Published: 24 Sep 2015

IBM

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

8 Tips for Building an IT Asset Management Program
sponsored by ServiceNow
WHITE PAPER: This white paper outlines 8 specific recommendations for building an IT Asset Management (ITAM) program that delivers measurable business value while saving you time, money, and hassle.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

ServiceNow

Volterra Fietta Strategizes Secure, Easy File Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores how international law firm Volterra Fietta went about adopting a tool for internal as well as external file sharing. Discover how the tool they chose increased security and efficiency in day-to-day file sharing activities and how you can improve your document management end user experiences.
Posted: 08 Sep 2015 | Published: 08 Sep 2015

IntraLinks, Inc

Urgency Grows for Automated Archiving Capabilities
sponsored by Commvault
WHITE PAPER: This white paper outlines the importance for automated archiving, and how it can help reduce the resources used to manage data. Read on to learn about what options organizations are considering for archiving, and why archiving should be incorporated into a comprehensive, enterprise-wide information management framework.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Commvault

Don't Let Manual Processes Hold Up Compliance in the Cloud
sponsored by CloudPassage
WHITE PAPER: This white paper explores the challenges of cloud compliance and gives advice for meeting these challenges. Learn how you can make compliance simple, even in cloud and virtual environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

How You Handle Storage Will Heavily Influence Your Cloud Success
sponsored by NetApp
WHITE PAPER: This informative report discusses how hybrid cloud storage can raise your infrastructure to the next level with improved data sharing, mobility, and elasticity. Read on to discover how you can smoothly transition your storage system to hybrid cloud.
Posted: 18 Jun 2015 | Published: 08 Jan 2015

NetApp

Information Governance: Fighting Back Against the Exponential Data Curve
sponsored by Veritas
WHITE PAPER: Access this white paper to learn how information governance can be used in the fight against exponential data growth.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Veritas

Microsoft Collaboration and Productivity Apps: A Dedicated Private Cloud for Your Microsoft Application
sponsored by Rackspace
WHITE PAPER: Read this white paper to find out why a dedicated private cloud is the best environment to run your Microsoft collaboration and productivity apps.
Posted: 08 Jun 2015 | Published: 18 May 2015

Rackspace

Ecommerce & Media Websites: A Custom Private Cloud to Handle Your Complex Website Requirements
sponsored by Rackspace
WHITE PAPER: E-commerce and media-rich websites require robust infrastructure, security, compliance, and high availability. A custom private cloud can handle these complex websites. Read this white paper to find out how to support the needs of these websites.
Posted: 05 Jun 2015 | Published: 18 May 2015

Rackspace

Creating a Test/Dev Environment in Minutes with Oracle Multitenant
sponsored by Oracle Corporation
WEBCAST: 28% of businesses have an annual database instance growth of more than 20% and less than 50% have consolidated, making database deployments siloed, dispersed, varied, and complex. Unfortunately, the traditional database provisioning process is time-consuming and inefficient. This webcast explains how to create a test/dev environment in minutes.
Posted: 14 May 2015 | Premiered: May 14, 2015

Oracle Corporation

Addressing HACCP Issues Within the Food and Beverage Industry Using ERP Software
sponsored by IFS
WHITE PAPER: Learn how your organization can put in place a system to comply with HACCP guidelines in this white paper. Uncover the importance of an effective ERP system in compliance for the purposes of gathering, tracking, and reporting functionality.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

IFS

Financial Services: Modern Big Data Architectures
sponsored by Red Hat
WHITE PAPER: Know your customer (KYC) policies and practices that are part of the response to anti-money laundering (AML) are becoming critical in meeting requirements of the US Patriot Act. Read this technology overview to learn about a solution for KYC and AML compliance.
Posted: 09 Mar 2015 | Published: 31 Jan 2015

Red Hat

ERP For DCAA Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about compliance requirements for working with the Department of Defense and determine whether your ERP software is up to the necessary standards.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

4 ERP Tips For FIAR Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about what it means to be in FIAR compliance and get 4 ERP tips that can help attain auditability for your business.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

Cloud Risk Management: Governance Strategies to Protect Digital Assets
sponsored by SearchCompliance.com
EBOOK: In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

SearchCompliance.com

Endpoint Security: Beyond Antivirus
sponsored by SearchSecurity.com
EBOOK: In this e-book, security experts share tips on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SearchSecurity.com

Data Governance Strategies for the Digital Age
sponsored by SearchCompliance.com
EBOOK: The digital age has forced many companies to alter - and sometimes completely revamp - data governance processes. In this handbook, learn about big data governance complications and the latest information management strategies for adapting to increased storage needs, data-specific compliance mandates and security vulnerabilities in the digital age.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

SearchCompliance.com

Deploying Microsoft Exchange 2013 Just Got Easier
sponsored by Citrix
WHITE PAPER: Access this informative guide that explains how to deploy Microsoft Exchange 2013 with an ADC that ensures remote access and load balancing of core components.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Citrix

CIO Decisions E-Zine - February 2015
sponsored by SearchCIO.com
EZINE: When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.
Posted: 04 Feb 2015 | Published: 30 Jan 2015

SearchCIO.com

BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchCompliance.com
26 - 50 of 607 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement