IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
76 - 100 of 659 Matches Previous Page  |  Next Page
IBM Endpoint Manager for Software Use Analysis
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores an endpoint management solution that provides important insight into what you own and how often software is being used to support better planning, budgeting, and vendor license compliance.
Posted: 11 Nov 2014 | Published: 14 Oct 2014

IBM

Closing Security Gaps in Mobile Applications
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper takes an in-depth look at mobile security.  Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

CA Technologies.

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Safeguard Business-Critical Resources with a Comprehensive Imaging and Printing Security Strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces a set of HP solutions that can help you assess, manage, and strengthen security within your organization.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Hewlett-Packard Limited

Your Critical Missing Security Vantage Point
sponsored by ObserveIT
WHITE PAPER: This white paper explains why user activity monitoring is critical in order to address the problem associated with users.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

ObserveIT

Smarter Backup with HP's Adaptive Backup Solution
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores an adaptive backup and recovery solution that uses predictive analytics and enhanced instrumentation.
Posted: 22 Oct 2014 | Published: 30 Jun 2014

Hewlett-Packard Company

Leveraging Endpoint Backup for Legal Holds & E-Discovery
sponsored by Code42
WHITE PAPER: This white paper describes endpoint backup's role in e-discovery, including the data collection and preservation capabilities it offers.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Code42

Enable Mobile Workforce Productivity without Putting your Organization at Risk
sponsored by Code42
WEBCAST: This webcast focuses on enabling mobile workforce productivity without putting your organization at risk. Learn more about this backup solution.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Code42

How to Choose an Endpoint Backup Solution
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Enterprise Endpoint Backup: Automatic Backup Solution
sponsored by Code42
WHITE PAPER: Access this white paper to find out about the single, scalable, cross-platform solution for enterprise endpoint backup that Genentech implemented to give them peace of mind.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Code42

Virtual Desktop Infrastructure (VDI) on Vblock Systems
sponsored by VCE
WHITE PAPER: This whitepaper reviews a n enterprise-class IT infrastructure solution designed to accelerate VDI deployment and provide performance at scale for the most demanding applications – all while keeping critical data and apps secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

VCE

Tracking Data Assets in the Cloud Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this Information Governance Symposium classroom, Jeffrey Ritter discusses often overlooked business issues when moving operations to the cloud, and presents key strategies for using cloud-based services that also comply with the dynamic demands of e-discovery.
Posted: 01 Oct 2014 | Premiered: 03 Oct 2014

SearchCompliance.com

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Rhode Island Blood Center Protects Donor Information and Locates Laptops using Absolute Computrace
sponsored by Absolute Software
CASE STUDY: In this case study, find out how the Rhode Island Blood Center used a simple, cost-effective solution to track hardware assets and ensure laptops remained protected.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Absolute Software

Electronic discovery management in the age of big data
sponsored by SearchCompliance.com
EBOOK: Electronic discovery management can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

SearchCompliance.com

How Do Top SIEM Products Compare in Common Client Deployment Scenarios?
sponsored by IBM
WHITE PAPER: This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.
Posted: 27 Aug 2014 | Published: 25 Jun 2014

IBM

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

LogRhythm Labs Embedded Expertise
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm Labs, an organization within LogRhythm that performs dedicated research to continually enhance the Security Intelligence Platform with embedded machine data intelligence, real-time threat detection, and automated compliance assurance.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Balancing Flexibility and Security With Cloud Applications
sponsored by BitGlass
WHITE PAPER: In this white paper, discover how a cloud application can have the flexibility of a public cloud app while maintaining the security and compliance of a private cloud.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

BitGlass

The SOX Effect
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchCompliance.com

Enterprise Lifecycle Management in a Changing World: Best Practices for Resolving Emerging Challenges in Desktop and Server Management
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This white paper reveals several evolving IT management challenges and best practices for tackling them.
Posted: 16 Oct 2014 | Published: 31 Dec 2011

FrontRange Solutions Inc.

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett-Packard Company

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM
76 - 100 of 659 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement