Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
1 - 25 of 601 Matches Previous Page  | Next Page
HIPAA/HITECH Compliance Using VMware vCloud Hybrid Service
sponsored by CDW Corporation
WHITE PAPER: Uncover the responsibilities for PHI in the cloud, as well as an introduction to the VMware Business Associate Agreement.
Posted: 15 Sep 2014 | Published: 31 Dec 2013

CDW Corporation

ORSA State of Readiness Survey: Addressing the Readiness of US Insurers for the RMOSA
sponsored by IBM
WHITE PAPER: With respect to establishing a risk management framework, insurers have made progress in defining most aspects of their strategies, but there is considerable work remaining with respect to successful implementations. So in short, how do you do it? Check out the following white paper to find out now.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

IBM

Curve fitting for calculating SCR under Solvency II
sponsored by IBM
WHITE PAPER: The following white paper intends to provide an insight into how some of Europe's leading insurers are applying Curve Fitting in practice, the benefits that are being derived and some of the practical challenges that need to be addressed.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

IBM

Truly Mobile File and Print Solution Provides Enterprise-Wide Coverage
sponsored by Novell, Inc.
WHITE PAPER: In this informative white paper, discover a new enterprise-class mobile file and print solution that provides file syncing, sharing, and printing to users wherever they are – all without compromising compliance or security standards.
Posted: 15 Sep 2014 | Published: 31 Dec 2012

Novell, Inc.

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: This white paper highlights the importance of IAM strategies complying with regulations to ensure strong security.
Posted: 11 Sep 2014 | Published: 01 Apr 2014

IBM

Identity management compliance How IAM systems support compliance
sponsored by IBM
EGUIDE: In this expert e-guide, learn about the identity management and compliance relationship, including how to ensure IAM technology and processes effectively support enterprise compliance.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

A closer look at Cloud regulations and risks
sponsored by IBM
EGUIDE: The expert e-guide reveals three steps to an enterprise framework for managing cloud risks that ensures your data stays secure and accessible.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

Log Management—The Foundation for Federal Security and Compliance
sponsored by Intel Security
WHITE PAPER: This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Posted: 10 Sep 2014 | Published: 31 Dec 2013

Intel Security

Achieving PCI DSS Peace of Mind in the Cloud
sponsored by CloudPassage
WHITE PAPER: Access this white paper to learn how you can achieve PCI DSS compliance in the cloud without any hassle or setbacks.
Posted: 09 Sep 2014 | Published: 30 Jun 2014

CloudPassage

Cloud and Compliance in One – Is It Possible?
sponsored by Intel Security
WHITE PAPER: Read this insightful report on an integrated security system that help organization stay protected and compliant in cloud-based environments.
Posted: 09 Sep 2014 | Published: 31 Dec 2013

Intel Security

Managing the Healthcare Information Stream Effectively
sponsored by CommVault Systems, Inc.
WHITE PAPER: Check out this white paper to discover the looming challenge of managing the healthcare information stream.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

CommVault Systems, Inc.

The Need for a New Approach to Provisioning
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the crucial need to handle risk appropriately when dealing with access control.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

Get Free GRC Resources and Connect with Peers
sponsored by RSA, The Security Division of EMC
RESOURCE: The RSA Archer GRC Community is an online network of GRC professionals who leverage the content and advice of RSA and its 11,000+ GRC members to help themselves and their organizations excel. Access white papers, blogs, webcasts and more.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

RSA, The Security Division of EMC

Effective Risk Assessment for Health Care Providers
sponsored by Solutionary
WHITE PAPER: In this in-depth white paper, gain critical insights into effective risk assessment implementation in today's healthcare organizations.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

Solutionary

Managed Security Service Providers Vs. On-Premise SIEM
sponsored by Solutionary
WHITE PAPER: This informative white paper compares the strengths and weakness of on SIEM products with the MSSPs, including the financial, operational, and organizations considerations of each.
Posted: 05 Sep 2014 | Published: 13 Mar 2014

Solutionary

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: Learn how identity and access management solutions from IBM Security can help organizations protect critical assets.
Posted: 04 Sep 2014 | Published: 01 Apr 2014

IBM

Meeting HIPAA Requirements for Private Cloud
sponsored by Logicworks
EGUIDE: Download this expert e-guide for a set of best practices for HIPPA compliance for private cloud implementation and management.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

Logicworks

Identity and Access Management Guidelines and How to Improve Your Strategy
sponsored by Forum Systems
EGUIDE: This expert e-guide reveals how to use an IAM maturity model to assess your identity and access management strategy.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

Forum Systems

Verizon PCI Report: Pen Testing, Passwords Cause PCI Assessment Gaffes
sponsored by Pwine Express
WHITE PAPER: In this expert guide, get critical insights on how you can help your organization meet PCI compliance regulations despite the many security challenges.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

Pwine Express

Learn How to Successfully Manage a Continuous Monitoring Program
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper provides an introduction to Continous Monitoring (CM), including definitions and common misperceptions. Learn how to successfully manage your own CM program.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

RSA, The Security Division of EMC

Biotechnology Company Automates Compliance, Delivers Cloud Services
sponsored by Hewlett-Packard Company
WHITE PAPER: Reduced provisioning from weeks to minutes.HP cloud and automation solutions helped a biotechnology company achieve a level of control that is unprecedented in its sector. Get the details by downloading and reading the case study.
Posted: 03 Sep 2014 | Published: 30 Jun 2014

Hewlett-Packard Company

Managed Mobility Services: Reduce Your Mobility Risk and Improve Productivity
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper introduces one company's managed mobility services, which provide secure access to mobile applications and data, and the ability to securely store, sync, and share files anytime, anywhere, and from any device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Limited

Internal Audit: Challenges and Solutions to Alignment
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this whitepaper, learn how Internal Audit (IA) can benefit from partnering with these organizational groups while maintaining a certain level of independence.
Posted: 02 Sep 2014 | Published: 01 Oct 2013

RSA, The Security Division of EMC

Information Security Magazine: September 2014
sponsored by SearchSecurity.com
EZINE: Open source software vulnerabilities have security executives worried. Lower your risk by revisiting application security policy and enforcing development best practices.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

SearchSecurity.com
1 - 25 of 601 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement