IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
76 - 100 of 664 Matches Previous Page  |  Next Page
Tracking Data Assets in the Cloud Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this Information Governance Symposium classroom, Jeffrey Ritter discusses often overlooked business issues when moving operations to the cloud, and presents key strategies for using cloud-based services that also comply with the dynamic demands of e-discovery.
Posted: 01 Oct 2014 | Premiered: 03 Oct 2014

SearchCompliance.com

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

IBM Infosphere Data Privacy for Hadoop
sponsored by IBM
WHITE PAPER: Find out about the IBM InfoSphere Data Privacy for Hadoop which can help businesses like you build confidence in big data.
Posted: 29 Sep 2014 | Published: 31 Jan 2014

IBM

Balancing Data Protection and Compliance in the Cloud
sponsored by CipherCloud
WHITE PAPER: This white paper outlines a cloud-based solution that helps organizations stick to compliance requirements, and offers reliable data protection in the cloud.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CipherCloud

The Time to Optimize ERP is Now
sponsored by Automic
WHITE PAPER: Find out what new ways to meet demand CIOs and application and operations teams are considering in order to facilitate growth, agility and maintain compliance during a time of the Internet of Things.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Automic

How Effective is Cloud-Provided Encryption?
sponsored by CipherCloud
RESOURCE: This blog post points out the issues surrounding cloud-provided encryption, and outlines why not all solutions are created equal.
Posted: 25 Sep 2014 | Published: 22 Jul 2014

CipherCloud

BFI Key Influencers Report: Top Issues in IT, Now and in the Future
sponsored by Sungard
WHITE PAPER: Written in conjunction with industry leaders across Banking, Finance, and Insurance, the BFI Key Influencers Report sets out to promote conversation on the future of IT by talking to those industry professionals who help to shape it.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

The 10-Minute Guide to Securing Email in the Cloud
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover a cloud encryption solution that caters to email security.
Posted: 23 Sep 2014 | Published: 31 Dec 2013

CipherCloud

US Top 5 Bank Encrypts Protects Data in Over 50 Salesforce Orgs
sponsored by CipherCloud
CASE STUDY: This case study features a top 5 bank in the US that uses an encryption solution to protect customer cloud data.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

CipherCloud

7 Essential Steps to Securing Your Cloud Data
sponsored by CipherCloud
WHITE PAPER: In this white paper, discover seven steps to take towards securing your cloud information.
Posted: 22 Sep 2014 | Published: 15 Oct 2013

CipherCloud

Rhode Island Blood Center Protects Donor Information and Locates Laptops using Absolute Computrace
sponsored by Absolute Software
CASE STUDY: In this case study, find out how the Rhode Island Blood Center used a simple, cost-effective solution to track hardware assets and ensure laptops remained protected.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Absolute Software

Electronic discovery management in the age of big data
sponsored by SearchCompliance.com
EBOOK: Electronic discovery management can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

SearchCompliance.com

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: This white paper highlights the importance of IAM strategies complying with regulations to ensure strong security.
Posted: 11 Sep 2014 | Published: 01 Apr 2014

IBM

Case Study: How to Negotiate a New Software License Contract
sponsored by CDW Corporation
VIDEO: This exclusive video explores the solution one company turned to, to negotiate their new software license contract.
Posted: 29 Aug 2014 | Premiered: 21 Jun 2012

CDW Corporation

Case Study: Clear Up Compliance Concerns with Software-Asset Management
sponsored by CDW Corporation
VIDEO: This exclusive video case study details how a software firm used software-asset management to clear up their compliance concerns.
Posted: 28 Aug 2014 | Premiered: 16 Apr 2012

CDW Corporation

Promise Healthcare case study
sponsored by Dell Software
WHITE PAPER: Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.
Posted: 20 Aug 2014 | Published: 01 Apr 2014

Dell Software

A Universal Log Management Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Case Study: How to Deal with a Self-Audit Request
sponsored by CDW Corporation
VIDEO: This video case study covers how one hospital group dealt with a self-audit request when they did not know if their software licensing was compliant.
Posted: 21 Jul 2014 | Premiered: 17 Apr 2014

CDW Corporation

Use Software Asset Management to Prevent the Rise of Rogue IT
sponsored by CDW Corporation
VIDEO: This exclusive video covers the need for software asset management to control end users during the rise of rogue IT.
Posted: 17 Jul 2014 | Premiered: 18 Apr 2014

CDW Corporation

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett-Packard Company

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM
76 - 100 of 664 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement