Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 615 Matches Previous Page  |  Next Page
Manage Threats with Governance and a DLP Suite
sponsored by Varonis
EGUIDE: This expert guide discusses the benefits of both governance and data loss prevention (DLP) solutions, and it gives advice for being smart when implementing these systems.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Varonis

10 Questions to Ask Your HIPAA-Compliant Messaging Vendor
sponsored by EverBridge Inc.
WHITE PAPER: This white paper details the 10 questions to ask when selecting a HIPAA-compliant messaging solution in order to ensure best compliance standards and communication services for your hospital or healthcare network.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

EverBridge Inc.

Telemedicine: Connecting to Patients Anywhere, Anytime
sponsored by EverBridge Inc.
WHITE PAPER: This white paper explores the steps for selecting a telemedicine service that meets your healthcare organization's needs.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

EverBridge Inc.

9 Secure Messaging Trends in Healthcare
sponsored by EverBridge Inc.
WHITE PAPER: This white paper explores 9 secure messaging trends in healthcare reported in a recent survey of over 150 healthcare professionals.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

EverBridge Inc.

Privacy Compliance Strategies from Leading Records Management Professionals
sponsored by IntraLinks, Inc
EGUIDE: This expert e-guide explores records and information management (RIM) professionals, and their likelihood to play a big role as businesses place increasing importance on privacy compliance. Uncover an interview with RIM expert John Isaza for insights on developing these programs.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IntraLinks, Inc

Understanding Data Protection Regulations in the US
sponsored by Varonis
WHITE PAPER: This white paper outlines several important security regulations in the United States and gives advice on successfully meeting all of them.
Posted: 25 Jun 2015 | Published: 31 Dec 2014

Varonis

Ignore Compliance, Focus on Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how enterprises that focus on security first to address an organization's sensitive data will solve compliance requirements along the way. Instead of following a compliance checklist, learn to tackle the 5 risk assessment methodologies to mitigate threats and ensure confidentiality.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Tips For Securing Cloud-Based ECM And Enterprise Collaboration Tools
sponsored by IntraLinks, Inc
EGUIDE: This e-guide explores how companies can use enterprise collaboration tools to brainstorm ideas in a secure, recordable fashion. Join Forrester's Rob Koplowitz as he explains adoption trends for compliant technological teamwork, and learn the competitive potential of deploying sooner than later.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

IntraLinks, Inc

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Service Optimization Maturity Assessment
sponsored by TeamQuest Corporation
VIDEO: This brief video explains how service optimization maturity models play a key role in gradually refining optimization efforts. Watch and learn how to optimize without compromising your overall service quality or value.
Posted: 23 Jun 2015 | Premiered: 23 Jun 2015

TeamQuest Corporation

When Risk Management and Information Governance Collide
sponsored by Symantec Corporation
EGUIDE: This expert e-guide outlines the ways companies can take advantage of information governance. Discover its associated analytics, which help alleviate risk.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Managing Your Dark Data
sponsored by Symantec Corporation
EGUIDE: Discover how your business can take steps to manage your dark data to determine what is useful and what can be eliminated. Access this eGuide now to get 6 steps to dark data information governance.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Making the Most Out of Your Mobile Information Governance Strategy
sponsored by Symantec Corporation
EGUIDE: In this e-guide, you'll uncover five important tips that will help you to steer your mobile information governance strategy in the best direction. Read now to learn how to make the most out of your BYOD and security policies to fit your company's needs.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

How Governance and Analytics Boost Information Value
sponsored by Symantec Corporation
EGUIDE: In this informative e-guide, learn why the biggest big data risk may be the inability to properly analyze every piece of information for potential value, and discover how governance and analytics can help reduce this risk.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015

Commvault

Data as currency: Creating information value in the digital age
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: As enterprises strive to find ways to monetize information, they must balance the impulse to exploit their data with security and privacy concerns. In this classroom, we'll explore how organizations can stay on the right side of the law as they extract value from data.
Posted: 15 Jun 2015 | Premiered: 08 Jun 2015

SearchCompliance.com

Predictive Threat and Risk Management: Meeting the Challenges of a Smarter Planet
sponsored by IBM
WHITE PAPER: No organization can - or should - put up with billions in losses due to poor risk management. This white paper brings to light the digital security made possible by business analytics. Access this resource if you are plagued by virtual surveillance challenges.
Posted: 11 Jun 2015 | Published: 31 Dec 2013

IBM

Managing Threat and Fraud with Predictive Analytics
sponsored by IBM
VIDEO: This brief video encourages a systematic approach to reducing exposure and minimizing negative impact. Start discovering your best defense by analyzing the billions of bits of data in your company.
Posted: 11 Jun 2015 | Premiered: 30 Mar 2015

IBM

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Meeting PCI and ISO Compliance Checklist
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides a checklist for meeting PCI and ISO compliance. Access now and discover what it takes to keep the cyber criminals at bay when it comes to your client's credit card information.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

RIM Likely to Lead Strategy as Privacy Compliance Becomes a Priority
sponsored by Iron Mountain
EGUIDE: This expert e-guide highlights insight from industry leader John Isaza on how records and information management (RIM) plays a huge role in reducing privacy compliance risk. Learn whow should "own" the data privacy responsibility at an organization, if development of a data privacy program can also benefit regulatory compliance.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Iron Mountain

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

SearchSecurity.com

Top Tips to Assure Records Management Compliance
sponsored by Iron Mountain
EGUIDE: This expert e-guide highlights the three missing links to assure records management compliance. Discover how companies can maintain documents and data that demonstrate the history assets, among other best practices, to help prove compliance.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Iron Mountain

Claims Validation with smartC and the Hortonworks Data Platform
sponsored by Hortonworks
RESOURCE: Discover how your organization can prevent insurance fraud with better data management. Access this white paper to learn how you can solve common compliance and insurance challenges.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Hortonworks

Harmonize File Sharing in Your Mac/Windows Environment
sponsored by Acronis
TRIAL SOFTWARE: Start your trial download for a file-and-print sharing tool today and mitigate protocol issues, performance, and compatibility problems. Discover three main benefits for Mac users in a Windows environment.
Posted: 29 May 2015 | Premiered: 29 May 2015

Acronis
1 - 25 of 615 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement