Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 567 Matches Previous Page  |  Next Page
How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

Building and Maintaining a Sustainable IT Risk and Compliance Program
sponsored by IBM
WEBCAST: This informative webcast presents how to build and maintain a sustainable IT risk and compliance approach to meet the challenges posed by sensitive data, managing technology assets, and evolving regulatory requirements.
Posted: 31 Jul 2015 | Premiered: Sep 19, 2014

IBM

Unprecedented Insight into Operational Risks
sponsored by IBM
WEBCAST: This webcast explores how to assess risks and controls across the enterprise and delve deeper to review specific business processes within each department. You'll learn how to expose risks that leave your organization vulnerable to losses. View now to discover how to improve risk management.
Posted: 31 Jul 2015 | Premiered: Feb 3, 2015

IBM

Predictive Intelligence, Advanced Analytics, and the Future of Risk-Aware Decision Making
sponsored by IBM
WHITE PAPER: This white paper shows how risk management can enhance forecasting accuracy by taking pages out of the meteorologist's book.
Posted: 31 Jul 2015 | Published: 12 Dec 2014

IBM

Operational Risk Management in the World of Big Data
sponsored by IBM
WHITE PAPER: This white paper shows how operation risk strategies can harness the 4 dimensions of big data to inform risk management scenarios and analytics to control loss events.
Posted: 31 Jul 2015 | Published: 09 Jul 2014

IBM

How to Raise Trust and Transparency in Big Data
sponsored by Oracle Corporation
WEBCAST: Within the data flow of an enterprise, application users face challenges every day. Often, these challenges result in the failure of crucial big data projects due to a lack of trust in data. In this webcast, join data integration specialist Julien Testut as he breaks down the wall between users and big data.
Posted: 31 Jul 2015 | Premiered: Jun 17, 2015

Oracle Corporation

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 30 Jul 2015 | Published: 09 May 2014

Citrix

Internal Audit and Its Evolving Role in GRC
sponsored by IBM
WHITE PAPER: Audit departments are now increasingly becoming viewed as key players in the context of corporate governance, risk and compliance (GRC) objectives. Access this white paper to discover details on internal audit and its role in empowering the organization to address key business risks as well as deduce emerging risks.
Posted: 29 Jul 2015 | Published: 30 Nov 2015

IBM

Practical Guidelines for Active Risk Management when Managing Oracle Licenses
sponsored by Matrix42
WHITE PAPER: This white paper presents the 10 commandments to surviving an Oracle audit.
Posted: 28 Jul 2015 | Published: 29 Apr 2015

Matrix42

Meaningful Use a Mixed Bag for Development of EHR Systems
sponsored by Hyland Software
EGUIDE: Learn which EHR features and functions are mandated by ONC if healthcare systems and physicians want to attest to meaningful use, how meaningful use has driven the development of EHRs, and why vendors believe that regulatory pressure has prevented more user-friendly approaches.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

Hyland Software

In Struggles, Meaningful Use Attestation Shapes EHR
sponsored by Hyland Software
EGUIDE: How have meaningful use programs influenced EHR initiatives? Access this e-guide now to find out why collaboration efforts within the healthcare industry may lead to a kinder, gentler meaningful use program.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

Hyland Software

Case Study: Simplified Global Software Distribution and License Management
sponsored by Matrix42
CASE STUDY: This case study takes a look at how one actuator solutions leader prepared for a massive audit and managed global software distribution compliance.
Posted: 17 Jul 2015 | Published: 24 Jun 2015

Matrix42

Avoiding Audit Surprises: Why License Compliance is a C-level Issue
sponsored by Matrix42
WHITE PAPER: This white paper examines how to optimize long-term license management and relieve your IT staff of manual tasks.
Posted: 16 Jul 2015 | Published: 30 Jun 2015

Matrix42

How To Solve The Compliance Challenge In The Cloud
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to find out how to solve the compliance challenge in cloud and virtual infrastructure environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Rethinking License Management: Mobile App Delivery and Access Made Easy
sponsored by Matrix42
WHITE PAPER: This white paper outlines how to treat license management as a proactive process rather than just a standalone management tool. Continue reading to learn more.
Posted: 15 Jul 2015 | Published: 01 Jul 2015

Matrix42

The Ins and Outs of Secure File Sharing
sponsored by BlackBerry
WEBCAST: One big gap persists in the file sync and sharing market: highly secure content delivery. This webcast features Jeff Holleran and Tim Choi, as they relay the challenges of compliant collaboration on multiple devices. Tune in and learn what is needed to keep content from being leaked during file sync and sharing.
Posted: 14 Jul 2015 | Premiered: May 14, 2015

BlackBerry

How a State Agency Consolidated Redundant Access Databases
sponsored by Matrix42
CASE STUDY: This case study explores how a state agency in Germany leveraged workspace management tools to consolidate redundant access databases during a merge of various agencies.
Posted: 13 Jul 2015 | Published: 31 Dec 2014

Matrix42

Challenges and Strategies for the Collaborative, BYOD/Mobile Workforce
sponsored by BlackBerry
WEBCAST: This webcast demonstrates how to take mobile productivity to a new level by implementing secure communication and access to data behind the firewall or in the cloud. Learn how to optimize enterprise mobility management when you connect employees to data, apps, services, and of course, each other.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

BlackBerry

Global Organization Leverages ITSM to Automate Workspace Management
sponsored by Matrix42
CASE STUDY: This case study examines how a global organization implemented a suite of IT service management (ITSM) solutions to meet information security standards and automate key processes.
Posted: 10 Jul 2015 | Published: 31 Dec 2014

Matrix42

The Advantages of a Unified Management Approach to End-User Devices
sponsored by Accelerite
WHITE PAPER: This white paper assures that, by forming strategic single endpoint management to cover all types of devices and operating systems, IT and your organization can reap many benefits. Discover the key to simplified, efficient compliance for administrators and self-service capabilities for end-users.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

Accelerite

Top 3 Principles for Selling Cloud Services
sponsored by FireHost Inc.
EGUIDE: This exclusive e-guide explores why there is still room for cloud service GRC improvement, while offering the top 3 principles managed service providers (MSPs) should keep in mind to help boost sales revenue.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

FireHost Inc.

Top 4 Security Concerns of the SaaS Delivery Model
sponsored by SAP
WHITE PAPER: This white paper addresses security concerns brought forth by cloud and SaaS models, including identity management, data storage, and data transmission. Learn the imperatives of built-in security features when it comes to your deployment.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

SAP

A Focus on Cloud Security, So You Can Focus on Business
sponsored by SAP
WHITE PAPER: This white paper stresses the critical importance of information protection in a cloud environment. Discover ways to implement security controls and practices in your SaaS strategy.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

SAP

Information governance in a big data world
sponsored by IBM
WHITE PAPER: With big data analytics and the influx of information streaming into your organization, your data governance approach will either unify people, processes, and technology – or tear them apart. Access this white paper and discover the key to creating a holistic governance framework that supports your business objectives and revenue goals.
Posted: 06 Jul 2015 | Published: 30 Sep 2014

IBM

Lead the Pack with Next Generation Business Reporting
sponsored by Cortell
CASE STUDY: This case study features the benefits of maximizing compliance. Learn how to use regulatory law to your advantage by optimizing business operations, reducing costs, and giving business users simple and intuitive access to data.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Cortell
1 - 25 of 567 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement