IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
51 - 75 of 694 Matches Previous Page  |  Next Page
IBM InfoSphere Guardium: Manage the Entire Data Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: This white paper introduces a robust solution from IBM capable of safeguarding your enterprise's data across all enterprise systems and data center environments.
Posted: 03 Feb 2015 | Published: 31 Oct 2013

IBM

Best Practices for PC Lockdown and Control Policies
sponsored by Viewfinity
WHITE PAPER: Fewer end user installed applications results in fewer application compatibility issues and better system reliability. Application instability and application conflicts generate a large number of support requests. Fewer unauthorized applications results in fewer support incidents and this leads to a lower TCO.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

Viewfinity

Best Practices for Selecting a VulnerabilityManagement(VM) Solution
sponsored by Qualys
WHITE PAPER: Access this checklist of best practices for selecting a vulnerability management solution that will save you time and help you understand what to look for.
Posted: 02 Feb 2015 | Published: 31 Dec 2013

Qualys

BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchCompliance.com

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

Providing Security and Compliance for an Ever-Growing Number of Endpoints
sponsored by IBM
WHITE PAPER: This white paper introduces you to an easy-to-manage, quick-to-deploy solution that supports security for a large variety and large numbers of endpoints — from servers to desktop PCs, Internet-connected laptops, smartphones and other mobile devices, as well as specialized equipment such as point-of-sale devices, ATMs and self-service kiosks.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

IBM

Aberdeen Video: Maximizing Profitability and Customer Service in Banking with Automated Financial Transactions
sponsored by IBM
WEBCAST: Watch this video to identify the problems facing financial institutions, technology they can adopt, and the benefits of automated financial transactions.
Posted: 28 Jan 2015 | Premiered: Jul 31, 2014

IBM

Turning Policies into Action with Progress Corticon
sponsored by Progress
WHITE PAPER: This paper examines the intersection of business rules management and business process management: what they are, how they interact, and why this is important to the agility, accuracy, cost and compliance of your business processes.
Posted: 27 Jan 2015 | Published: 30 Apr 2014

Progress

Healthcare Transformation and the Role of Business Rule Automation
sponsored by Progress
WHITE PAPER: Read this white paper to learn how a Business Rules Management system (BRMS) can help automate and manage business rules, giving organizations the potential implement policies and rules faster, lower IT implementation costs; reduce the turnaround time for change requests; and reduce the costs of unplanned changes and bug fixing
Posted: 26 Jan 2015 | Published: 31 May 2014

Progress

Governance, Risk, and Compliance for Critical Data Movement
sponsored by IBM
WEBCAST: Join this webinar with experts from Forrester Research to learn about the key trends in GRC. Find out how to develop your lines of defense, learn how to measure your organization's GRC maturity, and get three key tips for developing a successful strategy.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

IBM

Governance, Risk, Compliance as a Service (GRCaaS)
sponsored by Allgress
WHITE PAPER: This white paper examines a cloud-based governance risk and compliance management platform that enables automated compliance reporting, comprehensive risk reporting, improved auditing capabilities and more features that strengthen risk and compliance control.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Allgress

A New Approach to Managing Information & Technology Risk
sponsored by Allgress
WHITE PAPER: This white paper discusses this new approach to governance, risk management and compliance – one that manages IT risk as a key part of overall business operations and promotes stronger collaboration between IT and business-decision makers when it comes to mitigating and controlling these risks.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Allgress

Learn About Each Module of the Allgress Insight Risk Management Suite
sponsored by Allgress
WHITE PAPER: This white paper introduces a risk management suite that enables security professionals to apply business context to security and compliance management. It also empowers business stakeholders to make informed investment decisions that align with top business priorities.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

Allgress

Case Study: Effective Document Management Increases Efficiency
sponsored by Hewlett-Packard Limited
CASE STUDY: This case study features a pharmaceutical company that implemented a software program to manage its drug testing documentation.
Posted: 23 Jan 2015 | Published: 30 Apr 2012

Hewlett-Packard Limited

5 Reasons MSP's Love Time-Based Cloud Retention
sponsored by Datto, Inc.
WHITE PAPER: This executive brief highlights a service for managed service providers designed to take charge of backup, disaster recovery and business continuity.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Datto, Inc.

Engage Audit Professionals for Better Security Assessment Outcomes
sponsored by IBM
WHITE PAPER: This white paper explains how to leverage your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program
Posted: 22 Jan 2015 | Published: 26 Jun 2013

IBM

Transform Your Risk, Security, and Compliance Results into Business Insight
sponsored by Allgress
WHITE PAPER: This concise white paper introduces an IT GRC suite that enables risk, security, and compliance professionals to efficiently manage their enterprise's risk posture with quick time-to-value.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Allgress

CIO MarketPulse: Unlocking Employee Access to Information
sponsored by CommVault
RESOURCE: IT professionals face many challenges when it comes to managing data. Besides the sheer volume of data, IT must satisfy those who want instant access to data, protect data, and manage data on different devices. Access this brief resource to discover a way to manage data, while meeting all these needs and more.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

CommVault

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Absolute Software

Security Throughout the File Transfer Life-Cycle: A Managed File Transfer Imperative
sponsored by Ipswitch File Transfer
WHITE PAPER: Check out this informative white paper that highlights a new approach to secure your file transfers, and details the specific features included in a MFT system.
Posted: 16 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper explains why organizations need more than the PCI DSS compliance stamp in order to truly secure their POS systems; describes how to secure your POS systems against common attacks; and discusses the Council on CyberSecurity's top 20 suggestions for protecting payment card information.
Posted: 16 Jan 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

The true value of managed file transfer: Can you afford another day without?
sponsored by Ipswitch File Transfer
WHITE PAPER: This white paper helps get rid of the confusion behind MFT and highlights the overall business value that it provides.
Posted: 15 Jan 2015 | Published: 31 Dec 2013

Ipswitch File Transfer

The Definitive Guide to Managed File Transfer
sponsored by Ipswitch File Transfer
WHITE PAPER: View this resource to gain a better understanding of what managed file transfer (MFT) is all about, including its importance in our high tech world that we live in today.
Posted: 15 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

5 Steps to Reduce the Complexity of PCI Security Assessments
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper lists 5 steps that your enterprise can take to guard your endpoints; reduce the complexity of assessments; lower administration costs; and achieve a compliant, secure environment.
Posted: 14 Jan 2015 | Published: 06 Oct 2014

Bit9 + Carbon Black

A Prescription for Privacy
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the challenges surrounding the emerging world of EHR technology, including the requirements that govern the protection of confidential patient data online; the measures that organizations need to take right now to prepare for these upcoming changes to the healthcare industry; and more.
Posted: 14 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation
51 - 75 of 694 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement