Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 598 Matches Previous Page  |  Next Page
Predictive Coding: The Next Frontier in eDiscovery
sponsored by Zovy LLC
WHITE PAPER: Predictive coding, a form of technology assisted review (TAR), has been and will continue to dramatically change the way discovery is conducted during legal cases. Predictive coding is considerably more powerful than basic keyword searches. This whitepaper examines the value of predictive coding and how it can help organizations conduct eDiscovery.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Zovy LLC

GRC: An Alternative  Approach to Spreadsheets in Risk Management
sponsored by Modulo
WHITE PAPER: This white paper outlines the cost and complexity reducing benefits offered by one GRC strategy.  View now to learn how to retire spreadsheets and manual processes.
Posted: 30 Mar 2015 | Published: 10 Sep 2014

Modulo

Navigating the Legal and Compliance Implications of BYOD
sponsored by Dropbox for Business
WHITE PAPER: This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.
Posted: 30 Mar 2015 | Published: 04 Dec 2013

Dropbox for Business

How to Comply with HIPAA Security Regulations
sponsored by Symantec Corporation
EGUIDE: This expert e-guide lays out how to comply appropritely with HIPAA regulations and protect sensitive data.
Posted: 30 Mar 2015 | Published: 07 Jan 2015

Symantec Corporation

Two Industry Experts Offer Top Tips For Records Management
sponsored by Iron Mountain
WHITE PAPER: Access this helpful e-guide to learn from two compliance experts about the key steps to developing a records and infromation management privacy compliance program, as well as the risks companies potentially face by not getting rid of data.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

Iron Mountain

Case Study: Mitigating App Vulnerabilities Before Production
sponsored by IBM
CASE STUDY: In this case study, learn how one university was able to mitigate risk and vulnerabilities by taking advantage of a leading app scanning platform. Read on to explore how this platform enables the university's apps to comply with regulations and if it may be right for your organization.
Posted: 25 Mar 2015 | Published: 09 Apr 2014

IBM

Why Role Management has the Spotlight
sponsored by SailPoint Technologies
WHITE PAPER: Uncover how role management can help your organization manage information security and corporate risk in three key areas. Access now to learn more.
Posted: 24 Mar 2015 | Published: 04 Dec 2013

SailPoint Technologies

5 Important Truths about Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper, explore the five truths that offer answers to those critical questions. Read on to learn how to protect your users and enterprise in the digital workspace age.
Posted: 24 Mar 2015 | Published: 14 Jan 2015

RES Software

How to Empower Users and Maximize Security and Compliance
sponsored by RES Software
WHITE PAPER: In this white paper, learn the four simple steps to enabling anywhere, any device computing while securing multiple end points and access management.
Posted: 23 Mar 2015 | Published: 07 Jan 2015

RES Software

Safety analysis in safety-critical systems development
sponsored by IBM
WHITE PAPER: This paper explores how medical device can seamlesslyembed methodologies such as hazard analysis, fault tree analysis (FTA)and failure mode effects analysis (FMEA) into their developmentprocesses—helping them develop safe, FDA-compliant products.
Posted: 20 Mar 2015 | Published: 31 Oct 2014

IBM

DO-178C compliance: turn an overhead expense into a competitive advantage
sponsored by IBM
WHITE PAPER: This white paper introduces best practices for software development and DO-178C compliance and looks at solutions and approaches that can help organizations deliver safety-critical products, improve collaboration, and increase efficiency and profitability.
Posted: 20 Mar 2015 | Published: 30 Nov 2014

IBM

All Data Archive Tools are not Created Equal: The Importance of Index and Search
sponsored by Zovy LLC
WHITE PAPER: This whitepaper overviews how archiving tools with powerful index and search capabilities can help maximize the value of intellectual property, and contribute to successful data governance.
Posted: 19 Mar 2015 | Published: 19 Mar 2015

Zovy LLC

Shellshock: Best practices for responding to the next vulnerability or Six best practices for successful vulnerability response
sponsored by Alert Logic
WHITE PAPER: In this white paper, uncover the six steps to effective vulnerability response and how to craft your defensive strategy.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

How to make PCI DSS 3.0 compliance an every day practice or A guidebook to successful PCI DSS 3.0 compliance
sponsored by Alert Logic
WHITE PAPER: View this white paper to explore the evolution of security compliance from an annual event to an everyday practice and how to drill down the details.
Posted: 17 Mar 2015 | Published: 05 Nov 2014

Alert Logic

Are you regularly monitoring log data?
sponsored by Alert Logic
WHITE PAPER: In this quick infographic, you will learn the 13 collections and alerts that help support the infrastructure security of an automated log management system.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

How Personalized, Compliant Service Boosts Loyalty and Avoids Liability
sponsored by Oracle Corporation
WHITE PAPER: Access this informative white paper to learn more about the complex relationship between compliance and personalization. Get 5 steps to boost loyalty and avoid liability.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Oracle Corporation

Overcoming Stringent Dodd-Frank Act Recordkeeping Requirements
sponsored by Hewlett-Packard Company
CASE STUDY: View now and explore the challenges of staying compliant with stringent Dodd-Frank Act requirements.  Read on to learn how one strategy can help you retain and preserve structured and unstructured data across multiple applications and databases.
Posted: 11 Mar 2015 | Published: 09 Feb 2015

Hewlett-Packard Company

Case Study: Utilizing Predictive Coding to Remain Compliant
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how HP mitigated risks and reduced analysis costs in this case study.  Read on to learn how they were able to keep up with information requests and investigations by utilizing predictive coding.
Posted: 11 Mar 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

Case Study: Going Beyond Traditional GRC Utilities and Methods
sponsored by Hewlett-Packard Company
CASE STUDY: View now to learn how one financial services firm met regulatory obligation associated with vast quantities of structured and unstructured data.  Read on to learn how the firm secured, indezed, analyzed, and archived data across all media types.
Posted: 11 Mar 2015 | Published: 05 Feb 2014

Hewlett-Packard Company

Risk, Compliance, and Governance Challenge IT Integration Strategies
sponsored by Axway
RESOURCE: Access this infographic and check out the integration strategies GRC officers have used in the last year and what the impacts have been.
Posted: 11 Mar 2015 | Published: 08 Oct 2014

Axway

Safeguard Enterprise Compliance and Remain Vigilant Against threats.
sponsored by IBM
WHITE PAPER: This white paper discusses the challenges organizations face due to changing risk and compliance requirements.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

IBM

Safeguard Enterprise Compliance and Remain Vigilant Against Threats
sponsored by IBM
WEBCAST: In this webcast, learn how one security platform is streamlining and simplifying mainframe security maintenance.
Posted: 27 Feb 2015 | Premiered: Jan 7, 2015

IBM

Case Study: Staying Compliant with Global Regulations
sponsored by IBM
WEBCAST: In this featured webcast, learn how one international re-insurance leader keeps compliant with global regulations such as PCIDSS and STIGs. Watch now to learn how the enterprise was able to go from monthly compliance reports to near real-time analysis or risk exposures or compliance issues.
Posted: 25 Feb 2015 | Premiered: Apr 15, 2014

IBM

Staying Compliant for On-the-Fly Investigations
sponsored by Dell Software
WHITE PAPER: Access this white paper and learn how to make sense of all of your data and remain compliant for on-the-fly investigations.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

Dell Software

3 Step Guide for IT Governance & Compliance
sponsored by Dell Software
WHITE PAPER: This white paper details the three critical steps for maintaining compliance with external regulations and internal security policies. Read on to learn the four key external regulations to consider when preparing an IT compliance audit. Read on to learn more.
Posted: 23 Feb 2015 | Published: 13 Dec 2012

Dell Software
1 - 25 of 598 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement