IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
76 - 100 of 667 Matches Previous Page  |  Next Page
Artificial Intelligence Provider noHold Answers The Call With Rackspace Managed Cloud
sponsored by Rackspace
RESOURCE: Check out this resource to learn why noHold chose a world-class hybrid solution that combined security and data integrity
Posted: 14 Nov 2014 | Published: 02 Sep 2014

Rackspace

Migration Engine from Butterfly Software
sponsored by IBM
WHITE PAPER: This resource provides an overview of the migration procedure and an explanation for how your organization can access all of its data from a single backup platform, improving your RTO and RPO objectives and ensuring you are legally compliant as well as reducing your overall carbon footprint.
Posted: 12 Nov 2014 | Published: 31 May 2013

IBM

Endpoint Management for Data Centers - Under the Hood of a Data Center
sponsored by IBM
WHITE PAPER: Download this exclusive infographic to learn more about the current threat landscape and how you can improve security with effective endpoint management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

IBM Endpoint Manager, Built on BigFix Technology
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores how you can take control of your heterogeneous computing devices with effective endpoint management.
Posted: 11 Nov 2014 | Published: 09 May 2012

IBM

IBM Endpoint Manager for Software Use Analysis
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores an endpoint management solution that provides important insight into what you own and how often software is being used to support better planning, budgeting, and vendor license compliance.
Posted: 11 Nov 2014 | Published: 14 Oct 2014

IBM

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Maximizing Efficiency: Service Automation Best Practices
sponsored by FrontRange Solutions Inc.
WHITE PAPER: By automating provisioning, management, and remediation, you reduce operating costs and simplify users' information access time and process. Read on to learn the six challenges to conquer when automating existing processes and how to modernize your IT department into an innovation center.
Posted: 23 Oct 2014 | Published: 01 Oct 2014

FrontRange Solutions Inc.

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper describes endpoint backup's role in e-discovery, including the data collection and preservation capabilities it offers.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Code42

Enable Mobile Workforce Productivity without Putting your Organization at Risk
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

How to Choose an Endpoint Backup Solution
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Enterprise Endpoint Backup: Automatic Backup Solution
sponsored by Code42
WHITE PAPER: Access this white paper to find out about the single, scalable, cross-platform solution for enterprise endpoint backup that Genentech implemented to give them peace of mind.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Code42

Virtual Desktop Infrastructure (VDI) on Vblock Systems
sponsored by VCE
WHITE PAPER: This whitepaper reviews a n enterprise-class IT infrastructure solution designed to accelerate VDI deployment and provide performance at scale for the most demanding applications – all while keeping critical data and apps secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

VCE

Tracking Data Assets in the Cloud Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this Information Governance Symposium classroom, Jeffrey Ritter discusses often overlooked business issues when moving operations to the cloud, and presents key strategies for using cloud-based services that also comply with the dynamic demands of e-discovery.
Posted: 01 Oct 2014 | Premiered: 03 Oct 2014

SearchCompliance.com

Rhode Island Blood Center Protects Donor Information and Locates Laptops using Absolute Computrace
sponsored by Absolute Software
CASE STUDY: In this case study, find out how the Rhode Island Blood Center used a simple, cost-effective solution to track hardware assets and ensure laptops remained protected.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Absolute Software

MDM in Minutes
sponsored by IBM
VIDEO: Learn all the ins-and-outs of one industry-leading mobile device management platform.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

IBM

How Do Top SIEM Products Compare in Common Client Deployment Scenarios?
sponsored by IBM
WHITE PAPER: This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.
Posted: 27 Aug 2014 | Published: 25 Jun 2014

IBM

Healthcare organization improves security
sponsored by Dell, Inc.
WHITE PAPER: Discover how Promise Healthcare is able to speed access to medical applications with 35 percent faster network performance while achieving HIPAA compliance. Read this paper to learn how next-generation firewalls enable organizations to block even the most sophisticated threats.
Posted: 20 Aug 2014 | Published: 01 Apr 2014

Dell, Inc.

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

The SOX Effect
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchCompliance.com

Enterprise Lifecycle Management in a Changing World: Best Practices for Resolving Emerging Challenges in Desktop and Server Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper reveals several evolving IT management challenges and best practices for tackling them.
Posted: 16 Oct 2014 | Published: 31 Dec 2011

FrontRange Solutions Inc.

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett-Packard Company

Electronic discovery management in the age of big data
sponsored by SearchCompliance.com
EBOOK: Electronic discovery management can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

SearchCompliance.com
76 - 100 of 667 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement