IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
51 - 75 of 680 Matches Previous Page  | Next Page
Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

What to Look For In a Backup Solution to Deliver Improved Business Continuity
sponsored by Datto, Inc.
WHITE PAPER: This expert guide provides advice on how organizations can find a backup solution that can improve business continuity capabilities and prevent against data loss.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Datto, Inc.

Building out an IAM Infrastructure and Strategy while Supporting Compliance Needs
sponsored by IBM
EGUIDE: In this expert E-Guide, Forrester Research's Andras Cser discusses what the steps should be when building out an IAM infrastructure and strategy.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

IBM

The Changing Face Of Cyber-Attacks: Preventing Both External and Insider Threats
sponsored by CA Technologies.
WHITE PAPER: This resource highlights where organizations fall short in security and offers critical solutions to help improve data security, reduce costs, and maintain compliance via privileged identity management.
Posted: 19 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Understanding Regulatory Implications for Better Data, Connectivity, and Reporting
sponsored by OpenText GXS
WHITE PAPER: Find out what you need to do to remain compliant and competitive during a time of change, and uncover the benefits of enhancing operational efficiencies for new regulatory requirements.
Posted: 16 Jun 2014 | Published: 30 Apr 2014

OpenText GXS

Protect Your Brand with Alert Logic PCI DSS Compliance Solutions
sponsored by Alert Logic
WHITE PAPER: This product brief outlines Alert Logic's cloud-powered solutions and the unique benefits offered to help eliminate the burden of PCI compliance.
Posted: 13 Jun 2014 | Published: 30 Jun 2012

Alert Logic

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft

Accelerating Database Test and Development
sponsored by Oracle and Intel®
WHITE PAPER: This white paper explains the benefits of a solution that can easily be added to an existing Data Guard configuration to provide an industry leading low-cost, time and space efficient solution to enterprise requirements for snapshots and clones.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

Oracle and Intel®

Best Practices for Maintaining GRC During the Modern Age of Cloud Computing, BYOD and Big Data
sponsored by IBM
EGUIDE: This expert e-guide details three steps for maintaining compliance during cloud deployment, how BYOD and the cloud increase risk and how cloud SLAs can alleviate that risk and enhance data recovery.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

IBM

Mastering software license compliance to reduce costs
sponsored by Hewlett-Packard Company
WEBCAST: Software license management and software asset management (SAM) are common pain points for many organizations. In this webcast, learn how to simplify and optimize SAM with the right technology and the right processes, as well as how to better prepare for the inevitable audit.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett-Packard Company

Top Solutions and Approaches to Manage Modern Data Archiving Challenges
sponsored by Oracle and Intel®
EBOOK: This book explains modern data archiving challenges and highlights new solutions and approaches that can be used to manage these challenges.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

Oracle and Intel®

Cloud Adoption: Multi-Cloud Management Challenges
sponsored by Dell, Inc.
VIDEO: This valuable video details why a multi-cloud environment creates a more complex environment to manage.
Posted: 05 Jun 2014 | Premiered: 05 Jun 2014

Dell, Inc.

Workflow, governance and reporting – Solvency II
sponsored by IBM
WHITE PAPER: The following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
Posted: 23 May 2014 | Published: 23 May 2014

IBM

Take Action Against Downtime: How to Minimize Downtime in Four Steps
sponsored by GlobalScape
WHITE PAPER: This white paper explains the top 3 ways downtime will negatively impact organizations, and offers 4 steps to help you improve security and availability of your systems.
Posted: 23 May 2014 | Published: 23 May 2014

GlobalScape

Chartis - The Risk Enabled Enterprise - Global Survey Results and Two-year Research Agenda
sponsored by IBM
WHITE PAPER: The following white paper explores the various challenges associated with enterprise risk management and introduces a number of strategic initiatives that can be applied to cope with these obstacles. Learn the 4 integral parts to an ERM program and much more.
Posted: 23 May 2014 | Published: 23 May 2014

IBM

The Capabilities and Benefits of Enhanced File Transfer (EFT)
sponsored by GlobalScape
WHITE PAPER: This resource features a military-grade file transfer solution that ensures compliance with internal security policies and government regulations.
Posted: 23 May 2014 | Published: 31 Dec 2013

GlobalScape

Understand Your Data to Identify Issues in the File Transfer Process— and Move Forward
sponsored by GlobalScape
WHITE PAPER: This resource highlights a file transfer platform that offers complete visibility to help improve security and audit management.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

Secure by Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Overcoming Today's Compliance and Security Data-Related Challenges
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges.
Posted: 21 May 2014 | Published: 21 May 2014

Hexis Cyber Solutions Inc

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Keep in Mind User Privacy With the Cloud and Mobile Devices
sponsored by BitGlass
CASE STUDY: In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014


Third Party Tools: Strengthening Security, Compliance and Control of Microsoft® Office 365®
sponsored by Mimecast
WHITE PAPER: Office 365 represents Microsoft's latest venture into the Cloud services space. But despite the range of functionality offered in Office 365, it cannot be all things to all customers. This white paper discusses why some customers should consider the use of third-party tools to enhance Office 365's native capabilities.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Hardening Hadoop for the Enterprise
sponsored by WANdisco
WEBCAST: Prepare for Hadoop implementation with this knowledgeable webcast.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

WANdisco
51 - 75 of 680 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement