Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 580 Matches Previous Page  |  Next Page
Uncheck Yourself: Build a Security-First Approach to Avoid "Checkbox" Compliance
sponsored by Armor
WHITE PAPER: This white paper helps you understand compliance as simply a reporting function of a sound security posture. By devoting adequate resources to countering today's threats, you'll find that your organization meets all or nearly all compliance requirements, simply by following sound security practices.
Posted: 26 Oct 2016 | Published: 30 Sep 2016


Game Over: 3 Scenarios Where Compliance Isn't Enough
sponsored by Armor
WHITE PAPER: Discover 3 real-world "game over" scenarios to show you why simply being compliant isn't enough. Learn why compliance is just a basic first step, highlighting the need for real, proactive and ongoing security controls.
Posted: 25 Oct 2016 | Published: 30 Sep 2016


Security & Compliance Are No Gamble
sponsored by Armor
CASE STUDY: Discover how the gaming industry was able to create a more efficient, streamlined flow of processes and get military-grade security for sensitive information. Learn how your organization can reach the same level of compliance and security while allowing authorized parties to access data easily.
Posted: 25 Oct 2016 | Published: 30 Sep 2016


Integrated Security Technology & Management
sponsored by Armor
WHITE PAPER: Discover how to keep your sensitive data safe and your business up and running without interruptions. Ensure your organization, customers and sensitive data are protected by leveraging a defense-in-depth strategy that designed with integrated security from the ground up.
Posted: 24 Oct 2016 | Published: 30 Sep 2016


Compliance at Velocity
sponsored by Chef Software
WHITE PAPER: Discover why compliance at velocity is not only a possibility, but a reality. Learn how compliance can become simply another step on the assembly line and the idea of infrastructure as code, which allows your enterprise to specify its compliance-related requirements in ways that can be automatically tested.
Posted: 21 Oct 2016 | Published: 01 Jun 2016

Chef Software

The Essential Guide to Microsoft Azure Compliance
sponsored by Softchoice Corporation
RESOURCE: In this guide, you'll get a deep dive into security with Microsoft Azure and find answers to your compliance and regulations concerns in regards to moving into the cloud.
Posted: 20 Oct 2016 | Published: 30 Sep 2016

Softchoice Corporation

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016


Transforming Finance Processes for the Digital Economy
sponsored by SAP
WHITE PAPER: Finance is at the heart of the digital business, but the financial processes and technology platforms that have been utilized in the last 20 years aren't agile enough for the digital economy. Access this white paper to explore a modern approach to managing critical processes like planning and analysis, risk management, compliance, and more.
Posted: 17 Oct 2016 | Published: 17 Oct 2016


Why Security is a key part of an Office 365 Implementation
sponsored by Symantec + Blue Coat
WHITE PAPER: Are your security solutions prepared to handle the increase in traffic brought on by cloud apps? Learn how to add additional security to safeguard your organization and stay compliant when you move into the Office 365 cloud.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016


Log Management and Automation for NIST Cyber Security Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.
Posted: 07 Oct 2016 | Published: 30 Nov 2014

LogRhythm, Inc.

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

Meet the Need for Regulatory Risk Management
sponsored by IntraLinks, Inc
WHITE PAPER: Discover how to securely exchange data and documents across organizations while keeping within ever changing regulatory requirements. Learn how to centralize work papers for easy access and streamline enterprise risk assessments to quickly improve your security posture.
Posted: 04 Oct 2016 | Published: 30 Sep 2016

IntraLinks, Inc

Solutions for HIT Vendors Overview (US)
sponsored by VASCO Data Security International
WHITE PAPER: Discover how to simplify the adoption of regulatory requirements for EPCS, while improving efficiencies and reducing fraudulent activity. Learn how you can protect your complex technical environments, improve provider productivity and efficient patient care all within this short white paper.
Posted: 03 Oct 2016 | Published: 31 Dec 2015

VASCO Data Security International

10 Real-Time Reporting Strategies for Better Security and Compliance
sponsored by Dell Software
WHITE PAPER: With real-time auditing tools, you can immediately uncover what's happening in your environment. Learn about 10 reports designed to help you track changes in real-time, receive alerts about critical changes, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell Software

How one Investment Company Ensures Compliance while Slashing their IT Workload
sponsored by Dell Software
WHITE PAPER: Dragon Capital was able to audit changes to user access permissions and easily meet its compliance requirements. Learn how this investment firm enabled critical changes in real time, investigate incidents in minutes rather than hours or days, and more.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Dell Software

Cisco 2016 Midyear Cybersecurity Report
sponsored by OpenDNS
WHITE PAPER: The Cisco 2016 Midyear Cybersecurity Report provides insights for security professionals on the trends and developments affecting the security landscape for the last half of the year. Access now and go to page 45 in particular for a discussion on ransomware attacks on healthcare organizations.
Posted: 30 Sep 2016 | Published: 01 Jul 2016


GRC for the Real World: 4 Pillars of Success
sponsored by Dell Software
WHITE PAPER: When organizations leave behind clusters of poorly matched tools and avert the rise of siloes, they are better able to meet GRC requirements. Learn more about the four pillars of a successful GRC program.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

Dell Software

Compliant Digital Identity Protection for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover how you can protect identities, safeguard patient records, and enable compliance with regulations - all without disrupting fast access to healthcare applications and patient information. Learn how to make threats less threatening and ensure smooth patient care throughout your organization.
Posted: 29 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

5 Steps to Keeping Your Data Safe with a Content Mobility Solution
sponsored by Hitachi Data Systems
DATA SHEET: Explore a 5 step roadmap to help you choose the right content mobility platform for your organization and learn how you can eliminate information silos that handle different regulations, applications, and data types.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Hitachi Data Systems

Data Access Governance Solutions Demo
sponsored by STEALTHbits
PRODUCT DEMO: StealthAUDIT for DAG is an auditing, compliance, and governance framework for unstructured data and critical applications that provides comprehensive data collection, analysis, remediation workflows, and reporting. Click on the download now button to request a live demonstration of the Data Access Governance solutions.
Posted: 28 Sep 2016 | Premiered: 28 Sep 2016


Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

How To Know If Your Organization Is Ready For Data Governance Software
sponsored by Veritas
EGUIDE: It's important to ensure your organization is ready for a governance tool, or your software purchase is likely to fall flat. This e-guide takes a look at three different scenarios where data governance tools are often used to help you determine if your organization is ready for data governance software.
Posted: 10 Oct 2016 | Published: 05 Oct 2016


Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration
sponsored by Dell Software
EGUIDE: This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE: Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

Dell Software
1 - 25 of 580 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement