IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations)Reports
76 - 100 of 668 Matches Previous Page  | Next Page
Are You Doing All You Can to Protect Your Critical Business Information?
sponsored by Citrix
WHITE PAPER: Gain insight on the current vicious threat landscape and 7 information security best practices to keep your data protected wherever it goes.
Posted: 09 May 2014 | Published: 31 Dec 2013

Citrix

Take Control of Your PST Problem
sponsored by Dell Software
WHITE PAPER: Read this tech brief to find out how Dell Migration Manger can help you alleviate administrative and compliance challenges created by an abundance of PST files on employee desktops.
Posted: 06 May 2014 | Published: 07 May 2013

Dell Software

A Sustainable Print Agenda
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom recommend strategies for achieving a cost-effective, reliable and sustainable print infrastructure.
Posted: 02 May 2014 | Published: 02 May 2014

ComputerWeekly.com

Rethinking Backup and Recovery: Business Continuity in the Datacenter and Beyond
sponsored by Asigra
WEBCAST: This on-demand webinar explains the challenges of the modern data center in terms of developing a business continuity strategy that can handle backing up all of the data from new devices and apps.
Posted: 30 Apr 2014 | Premiered: Apr 24, 2014

Asigra

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

CommVault Systems, Inc.

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper uncovers the various aspects of governance, risk, and compliance (GRC), and offers key advice on how to build a platform that will help organizations improve overall operations.
Posted: 28 Apr 2014 | Published: 31 Oct 2013

CommVault Systems, Inc.

DR, VMs, and Mission-Critical Data
sponsored by SearchServerVirtualization
VIRTUAL ENVIRONMENT: Virtualization saves companies money on hardware, but it also should be part of a thorough disaster recovery plan. The mobility of workloads and the ability to back up and fail over workloads from different locations enables a smooth recovery in the event of disaster.
Posted: 28 Apr 2014 | Premiered: 28 Apr 2014

SearchServerVirtualization

Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper features threat-aware IAM software that offers centralized security management across both physical and virtual applications.
Posted: 24 Apr 2014 | Published: 31 Dec 2013

IBM

HIPAA Compliance in a BYOD Environment
sponsored by Imprivata
EGUIDE: Access this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
WHITE PAPER: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Secure Virtual Desktop Infrastructure for HIPAA Compliance
sponsored by Imprivata
WHITE PAPER: This white paper explores the benefits of a virtual desktop infrastructure (VDI) for healthcare facilities trying to implement mobile devices for improved secure patient data access.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

R UR DOCS TXTING?
sponsored by Imprivata
WEBCAST: This webcast, hosted by Ed Ricks, CIO of Beaufort Memorial Hospital, explains the compliance concerns with clinician text messaging, and shares Beaufort's experience implementing a secure, compliant solution that was able to reduce time wasted using communication technologies.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Imprivata

HIPAA Compliance: Sign on to Robust Access Controls
sponsored by Imprivata
WHITE PAPER: View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

Imprivata

Improving Security with GRC Best Practices
sponsored by TechTarget
RESOURCE: Although they have many of the same goals, an organization's compliance and security departments usually do not work together enough to meet common objectives. Take this 2 minute survey and gain access to this eguide which outlines essential guidelines for improving security with governance, risk and compliance best practices.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

TechTarget

A Guide to Data Privacy for Business and IT Executives
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

IntraLinks, Inc

The Economic and Productivity Impact of IT Security on Healthcare
sponsored by Imprivata
WHITE PAPER: This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations.
Posted: 11 Apr 2014 | Published: 31 May 2013

Imprivata

Transferring Data without Secure Protocols?
sponsored by GlobalScape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

GlobalScape

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

Cut through complexity: The key to IAM success
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: 17 Apr 2014 | Published: 31 Aug 2013

RSA, The Security Division of EMC

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

The Case for GRC: Addressing the Top 10 GRC Challenges
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper shares the top 10 governance, risk, and compliance (GRC) challenges, and offers industry-leading advice on how to make the best investments in each of these areas.
Posted: 16 Apr 2014 | Published: 31 Dec 2012

RSA, The Security Division of EMC

2013 RSA Archer GRC Summit: Key Findings
sponsored by RSA, The Security Division of EMC
WHITE PAPER: View this white paper for the top findings from the most recent RSA GRC (governance, risk, and compliance) Forum to learn which of the latest compliance and risk management trends you should consider for your own strategy.
Posted: 15 Apr 2014 | Published: 30 Sep 2013

RSA, The Security Division of EMC

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.
76 - 100 of 668 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement