Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 568 Matches Previous Page  |  Next Page
Shadow Data: Why Traditional Security Leaves Your Organization Vulnerable
sponsored by Elastica
WHITE PAPER: This exclusive white paper reviews Shadow Data trends to provide insights into data security and compliance issues.
Posted: 01 Sep 2015 | Published: 29 Jul 2015

Elastica

Case Study: Streamline Workflow, Enhance Documentation Quality & Efficiency
sponsored by Aventura
WHITE PAPER: This case study demonstrates how one provider's struggle with an inefficient EHR platform was turned around with the optimization of one simple feature.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Aventura

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data protection.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

Steer Your Enterprise Towards Smooth Mobility
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper weighs the benefits of securely adopting enterprise mobility and the potential roadblocks of doing so. Read on to learn more about secure enterprise mobility and its potential to impact every facet of your organization, from VPN to VDI.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

How One Ukrainian Bank Secures High-Risk Online Transactions
sponsored by SafeNet, Inc.
CASE STUDY: This case study reveals the solution that enabled Prominvestbank, one of the largest banks in Ukraine, to securely authenticate their online banking customers and accept transaction signatures online. Read on to learn about the benefits that these security services could bring to your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

SafeNet, Inc.

Urgency Grows for Automated Archiving Capabilities
sponsored by Commvault
WHITE PAPER: This white paper outlines the importance for automated archiving, and how it can help reduce the resources used to manage data. Read on to learn about what options organizations are considering for archiving, and why archiving should be incorporated into a comprehensive, enterprise-wide information management framework.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Commvault

Case Study: Optimizing CDM and CMaaS Across the Federal Government
sponsored by Splunk
WHITE PAPER: This tech brief features machine data management capabilities that provide the level of visibility required to deliver risk intelligence and reporting. Access now and discover effective continuous monitoring methods.
Posted: 16 Aug 2015 | Published: 16 Aug 2015

Splunk

How Speech Analytics Helps You Take Charge of Compliance and Liability
sponsored by Calabrio, Inc.
WHITE PAPER: The two aims of this paper are to alert readers to the federal level regulations and liability exposures that most directly impact the activities of modern contact centers and explain how speech analytics can help monitor compliance and reduce the risk of liability exposures.
Posted: 15 Aug 2015 | Published: 15 Aug 2015

Calabrio, Inc.

The Hidden Costs of Compliance: 3 Biggest Transactional Risks
sponsored by Avalara
WHITE PAPER: This white paper outlines the three most important transactional risks to look out for in your organization. Learn how to manage transactional activities in your accounting, ERP, and ecommerce system and make these systems more accessible and affordable.
Posted: 13 Aug 2015 | Published: 05 Nov 2014

Avalara

How to Support IT with an Automated Monitoring Process
sponsored by Splunk
WHITE PAPER: This white paper introduces methodologies for incorporating a highly scalable engine for machine-generated IT data. Read on to learn how to collect, index and harness machine data across physical, virtual and cloud infrastructures.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Splunk

Comparing App Release with and without Automation
sponsored by Automic
WHITE PAPER: This white paper explores the benefits of automating app deployment processes to reduce risk and compliance failure costs.
Posted: 07 Aug 2015 | Published: 08 Jul 2015

Automic

The Cyber-Centric Enterprise: Maintaining a Dynamic Security Posture in a Chaotic Threat
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.
Posted: 05 Aug 2015 | Premiered: 28 Jul 2015

SearchSecurity.com

Business Intelligence on Cloud: Operate and Succeed at a New Business Speed
sponsored by IBM
WHITE PAPER: This brief white paper takes you through the benefits of reporting, analysis, dashboards and visualization capabilities offered as SaaS. Access now to learn how to deploy and deliver insights faster without compromising compliance or security.
Posted: 04 Aug 2015 | Published: 31 Mar 2015

IBM

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER: Follow the evolution of HIPAA-HITECH regulations over the past few years, learn why compliance is more important than ever before, and gain knowledge on how to avoid violations inside this resource.
Posted: 04 Aug 2015 | Published: 15 Jul 2015

Absolute

ECM Trends: Cloud, Compliance and Records Management
sponsored by OnBase by Hyland
EGUIDE: In this expert e-guide, you'll learn why ECM systems are becoming a staple in today's enterprises. Additionally, discover why ECM is considered the heart of a well-governed compliance policy.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

OnBase by Hyland

MSP Uses Automation for Better Backup, Compliance
sponsored by Solarwinds N-able
CASE STUDY: This white paper details how one multi-industry MSP was able to give their clients the data protection and compliance they needed through automation. Read on to learn about the benefits of MSP automation.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Solarwinds N-able

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 30 Jul 2015 | Published: 09 May 2014

Citrix

Meaningful Use a Mixed Bag for Development of EHR Systems
sponsored by OnBase by Hyland
EGUIDE: Learn which EHR features and functions are mandated by ONC if healthcare systems and physicians want to attest to meaningful use, how meaningful use has driven the development of EHRs, and why vendors believe that regulatory pressure has prevented more user-friendly approaches.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

OnBase by Hyland

In Struggles, Meaningful Use Attestation Shapes EHR
sponsored by OnBase by Hyland
EGUIDE: How have meaningful use programs influenced EHR initiatives? Access this e-guide now to find out why collaboration efforts within the healthcare industry may lead to a kinder, gentler meaningful use program.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

OnBase by Hyland

How To Solve The Compliance Challenge In The Cloud
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to find out how to solve the compliance challenge in cloud and virtual infrastructure environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

The Ins and Outs of Secure File Sharing
sponsored by BlackBerry
WEBCAST: One big gap persists in the file sync and sharing market: highly secure content delivery. This webcast features Jeff Holleran and Tim Choi, as they relay the challenges of compliant collaboration on multiple devices. Tune in and learn what is needed to keep content from being leaked during file sync and sharing.
Posted: 14 Jul 2015 | Premiered: May 14, 2015

BlackBerry

Challenges and Strategies for the Collaborative, BYOD/Mobile Workforce
sponsored by BlackBerry
WEBCAST: This webcast demonstrates how to take mobile productivity to a new level by implementing secure communication and access to data behind the firewall or in the cloud. Learn how to optimize enterprise mobility management when you connect employees to data, apps, services, and of course, each other.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

BlackBerry

The Advantages of a Unified Management Approach to End-User Devices
sponsored by Accelerite
WHITE PAPER: This white paper assures that, by forming strategic single endpoint management to cover all types of devices and operating systems, IT and your organization can reap many benefits. Discover the key to simplified, efficient compliance for administrators and self-service capabilities for end-users.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

Accelerite
1 - 25 of 568 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement