IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
26 - 50 of 669 Matches Previous Page  | Next Page
Enterprise Mobility: A Checklist for Secure Containerization
sponsored by Code42
WHITE PAPER: Containerization is a security method that separates enterprise applications and data from personal applications and data. This white paper explains the pros and cons of various approaches to containerization.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Compliance - Protecting Payment Information with PCI DSS
sponsored by GlobalScape
WHITE PAPER: This informative whitepaper outlines strategies for protecting your customer data, remaining compliant and explains why complying with regulations won't ensure security.
Posted: 07 Jul 2014 | Published: 31 Dec 2013

GlobalScape

City of Manchester Solves Personal Storage File Problems
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how the city of Manchester, New Hampshire went about solving their personal storage file problem.
Posted: 07 Jul 2014 | Published: 10 Jul 2013

C2C Systems

Three steps to a successful VNA strategy
sponsored by Perceptive Software
WHITE PAPER: This white paper explains how the "Walk-Run-Fly" strategy can help healthcare organizations use VNA to effectively manage content.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Perceptive Software

Protecting Digitalized Assets in Healthcare: Which Managed File Transfer Deployment Model is Right for You?
sponsored by GlobalScape
WHITE PAPER: Learn what types of policies and tools can be implemented to secure valuable healthcare data.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

GlobalScape

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of a backup solution built to handle the requirements of volume, mobility and compliance in a more streamlined and cost-effective way.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

Code42

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Data Security Checklist: Tips for Managing the Mobile Enterprise
sponsored by Accellion, Inc.
WHITE PAPER: This document presents a checklist of data security features to consider when establishing an enterprise mobility management strategy.
Posted: 01 Jul 2014 | Published: 30 Nov 2013

Accellion, Inc.

What to Look For In a Backup Solution to Deliver Improved Business Continuity
sponsored by Datto, Inc.
WHITE PAPER: This expert guide provides advice on how organizations can find a backup solution that can improve business continuity capabilities and prevent against data loss.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Datto, Inc.

Building out an IAM Infrastructure and Strategy while Supporting Compliance Needs
sponsored by IBM
EGUIDE: In this expert E-Guide, Forrester Research's Andras Cser discusses what the steps should be when building out an IAM infrastructure and strategy.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

IBM

The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Understanding Regulatory Implications for Better Data, Connectivity, and Reporting
sponsored by OpenText GXS
WHITE PAPER: Find out what you need to do to remain compliant and competitive during a time of change, and uncover the benefits of enhancing operational efficiencies for new regulatory requirements.
Posted: 16 Jun 2014 | Published: 30 Apr 2014

OpenText GXS

Keep in Mind User Privacy With the Cloud and Mobile Devices
sponsored by BitGlass
CASE STUDY: In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014


Protect Your Brand with Alert Logic PCI DSS Compliance Solutions
sponsored by Alert Logic
WHITE PAPER: This product brief outlines Alert Logic's cloud-powered solutions and the unique benefits offered to help eliminate the burden of PCI compliance.
Posted: 13 Jun 2014 | Published: 30 Jun 2012

Alert Logic

Simplifying IT Operations and Improving Data Access Security
sponsored by Vormetric
WHITE PAPER: This resource explores the challenges in key management encryption and explains why current solutions fall short.
Posted: 12 Jun 2014 | Published: 31 Jul 2012

Vormetric

Third Party Tools: Strengthening Security, Compliance and Control of Microsoft® Office 365®
sponsored by Mimecast
WHITE PAPER: Office 365 represents Microsoft's latest venture into the Cloud services space. But despite the range of functionality offered in Office 365, it cannot be all things to all customers. This white paper discusses why some customers should consider the use of third-party tools to enhance Office 365's native capabilities.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Accelerating Database Test and Development
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains the benefits of a solution that can easily be added to an existing Data Guard configuration to provide an industry leading low-cost, time and space efficient solution to enterprise requirements for snapshots and clones.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

Oracle Corporation

Vormetric Encryption Architecture Overview
sponsored by Vormetric
WHITE PAPER: This white paper explains why an encryption strategy is a must in order to better protect data from security breaches.
Posted: 10 Jun 2014 | Published: 31 Dec 2012

Vormetric

Best Practices for Maintaining GRC During the Modern Age of Cloud Computing, BYOD and Big Data
sponsored by IBM
EGUIDE: This expert e-guide details three steps for maintaining compliance during cloud deployment, how BYOD and the cloud increase risk and how cloud SLAs can alleviate that risk and enhance data recovery.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

IBM

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft
26 - 50 of 669 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement