IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
51 - 75 of 613 Matches Previous Page  |  Next Page
Hertz - World leading car rental company usesVMware View to simplify infrastructure andimprove user experience
sponsored by VMware
WHITE PAPER: This white paper explains how VMware can help you simplify your server and desktop environment through virtualization. Read now to find out how Hertz cut costs and improved compliance.
Posted: 28 May 2015 | Published: 28 May 2015

VMware

Capitalize on a Big Opportunity: Move Enterprise Services to the Cloud
sponsored by Dimension Data
WHITE PAPER: Access this informative guidebook to learn how you can build a successful enterprise cloud solution.
Posted: 20 May 2015 | Published: 20 May 2015

Dimension Data

Addressing HACCP Issues Within the Food and Beverage Industry Using ERP Software
sponsored by IFS
WHITE PAPER: Learn how your organization can put in place a system to comply with HACCP guidelines in this white paper. Uncover the importance of an effective ERP system in compliance for the purposes of gathering, tracking, and reporting functionality.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

IFS

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
sponsored by Imprivata
WHITE PAPER: Access this white paper to learn about the security requirements of the electronic prescribing of controlled substances and how to make sure you're complying with government regulations.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

ERP For DCAA Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about compliance requirements for working with the Department of Defense and determine whether your ERP software is up to the necessary standards.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

4 ERP Tips For FIAR Compliance
sponsored by IFS
WHITE PAPER: In this valuable white paper learn more about what it means to be in FIAR compliance and get 4 ERP tips that can help attain auditability for your business.
Posted: 18 Feb 2015 | Published: 31 Dec 2014

IFS

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

The Hidden Value of Archiving
sponsored by Mimecast
WHITE PAPER: The sheer amount of data flowing through email can put a strain on IT. How can companies keep the data they need in case of legal action?This white paper outlines the value of archiving over backup.
Posted: 19 Dec 2014 | Published: 31 Aug 2014

Mimecast

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: Access this resource to discover how organizations can deal with internal and external user identities, enterprise-wide ID management infrastructure, ID management challenges, and more.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

Deploying Microsoft Exchange 2013 Just Got Easier
sponsored by Citrix
WHITE PAPER: Access this informative guide that explains how to deploy Microsoft Exchange 2013 with an ADC that ensures remote access and load balancing of core components.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Citrix

CIO Decisions E-Zine - February 2015
sponsored by SearchCIO.com
EZINE: When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.
Posted: 04 Feb 2015 | Published: 30 Jan 2015

SearchCIO.com

BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchCompliance.com

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

The SOX Effect
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchCompliance.com

Enterprise Lifecycle Management in a Changing World: Best Practices for Resolving Emerging Challenges in Desktop and Server Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper reveals several evolving IT management challenges and best practices for tackling them.
Posted: 16 Oct 2014 | Published: 31 Dec 2011

FrontRange Solutions Inc.

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett Packard Enterprise
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett Packard Enterprise

Electronic discovery management in the age of big data
sponsored by SearchCompliance.com
EBOOK: Electronic discovery management can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

SearchCompliance.com

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM
51 - 75 of 613 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement