Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 531 Matches Previous Page  |  Next Page
Stay in Compliance: Clinical Standards Data Management
sponsored by Cambridge Semantics
VIDEO: In this short video explore the capabilities clinical data standards management systems, and discover how your organization can stay in compliance come December 2016.
Posted: 04 Feb 2016 | Premiered: 04 Feb 2016

Cambridge Semantics

Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

CommVault Holistic Data Protection Center: Compliance & E-Discovery
sponsored by Commvault
RESOURCE CENTER: In this article, you will discover a holistic and automated approach to retaining and accessing the right information across your network.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Commvault

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

The CISO Role and the Ups and Downs of Cloud Compliance
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

CloudPassage

The ISO 27001 Information Security Framework
sponsored by Coalfire
WEBCAST: This webcast introduces the ISO 27001 standard and how businesses can benefit from its framework to manage security.
Posted: 27 Jan 2016 | Premiered: Oct 27, 2015

Coalfire

FISMA vs FedRAMP Controls and Authorization Differences
sponsored by Coalfire
WHITE PAPER: Inside this white paper, you'll learn the differences between FISMA and FedRAMP, including how the controls tested and the authorization process compare for both FISMA and FedRAMP. Read on to learn more.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Coalfire

Data Governance in the Big Data World
sponsored by Trillium Software
WHITE PAPER: In this paper you will uncover the impact of new paradigms on data governance and consider how data governance and data quality solutions are adapting to meet the requirements of this new age of big data. Download now to learn more.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

Trillium Software

Amaya Gaming Experiences Smarter Development and Reduces Compliance Headache
sponsored by Splunk
CASE STUDY: Discover how global gaming company Amaya was able to eliminate compliance challenges, gain critical insights in to development and performance, and improve DevOps collaboration with the help of one system.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Splunk

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Checklist: Revenue Cycle Management Pain Points
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: In this white paper uncover 13 critical questions to help you determine if your revenue cycle management (RCM) process is under control, plus tips on what to look for in RCM services and how to select the right vendor for your healthcare organization.
Posted: 14 Jan 2016 | Published: 14 Jan 2016

Allscripts Healthcare Solutions

Food & Beverage Helps Manufacturers Prepare for COOL Compliance and Recall Readiness
sponsored by Infor
WHITE PAPER: After reading this white paper, you'll be inspired to better prepare for compliance regulations by reading about how food and beverage manufacturers follow country of origin labeling (COOL.) Access now and become one step closer to creating detailed documentation that helps protect your brand integrity.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Infor

Utility Protects Servers and Simplifies Compliance with Access Management
sponsored by FoxT
CASE STUDY: Defining, managing, and enforcing authentication automatically across diverse IT platforms and locations is no easy feat. This case study explores how South Western Electric & Power Company enabled effective access control and centralized administration, authentication, authorization, and auditing.
Posted: 06 Jan 2016 | Published: 04 Dec 2015

FoxT

Mobile data security ambiguity raises unique governance challenges
sponsored by TechTarget
RESOURCE: The new threat of breaches in today's digital era further complicates governance processes, while compliance rules require innovative methods to track and analyze information. Let independent compliance experts explain how you can adapt inside your free copy of Data Governance in the Digital Age.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

TechTarget

Creating a Security Program That Exceeds Any Compliance Standard
sponsored by Tenable Network Security
WHITE PAPER: This resource describes the PCI DSS, the standard technical and operational requirements to protect cardholder data.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Tenable Network Security

Devise a Cloud Security Strategy for Governance Needs
sponsored by IBM
EGUIDE: This expert e-guide teaches you how to build a cloud security strategy that aligns with compliance requirements and governance needs.
Posted: 23 Dec 2015 | Published: 09 Dec 2015

IBM

Why the Security Industry Needs to Adjust to the New CASB Market
sponsored by IBM
EGUIDE: Learn from experts Rob Wright and Dave Shackleford as they discuss the domination of startups in the suddenly hot cloud access security broker market and what will happen if larger vendors decide to join the party.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

IBM

Automate PCI Compliance Monitoring, Investigation & Reporting
sponsored by AccelOps Inc.
WHITE PAPER: This helpful white paper outlines the 12 PCI DSS requirements a compliance automation strategy needs to fulfill and explores what features to look for when selecting an approach.
Posted: 01 Dec 2015 | Published: 13 Apr 2011

AccelOps Inc.

Records Managers Gain Stature
sponsored by SearchContentManagement
EBOOK: More data to deal with and new tools to use on that data are helping elevate the status of records managers within their organizations.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

SearchContentManagement

Records Managers Gain Stature
sponsored by SearchContentManagement
EBOOK: In this expert e-guide, learn how to deal with the ever-growing pileup of content and data many organizations are contending with. Topics covered include how new requirements are effecting records management roles, compliance is a growing concern when it comes to content management, and more.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

SearchContentManagement

How To Find Cloud Services For Any Compliance Requirement
sponsored by VMware
VIDEO: This brief video offers a quick look into a network of cloud service providers that can meet any compliance requirement, as well as enable unprecedented levels of extensibility and flexibility in your IT infrastructure.
Posted: 16 Nov 2015 | Premiered: 03 Mar 2015

VMware

Magic Quadrant for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this magic quadrant to learn how vendors are updating SIEM technologies for growing threat prevention needs, and how they can help you.
Posted: 12 Nov 2015 | Published: 20 Jul 2015

LogRhythm, Inc.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Cloud Collaboration Ensures Compliance, Flight Safety
sponsored by Microsoft
WHITE PAPER: This case study explores how an air navigation service provider they designed a mobile cloud app for their document review process to ensure better compliance, collaboration, and flight safety.
Posted: 11 Nov 2015 | Published: 31 Mar 2015

Microsoft

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software
1 - 25 of 531 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement