Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 558 Matches Previous Page  |  Next Page
Financial Institutions Data Quality Is Vital For BCBS 239 Compliance
sponsored by Infogix
EBOOK: Discover how your organization can incorporate data quality checks into your risk data aggregation and reporting processes by downloading this e-book now. Learn how you can stay in compliance with BCBS 239 guidelines.
Posted: 27 Apr 2016 | Published: 27 Apr 2016

Infogix

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: This white paper helps CISOs identify emerging data-centric audit and protection tools that they can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

Risk or Reward? UC, IM, and Social Media in the Pharmaceutical Industry
sponsored by Actiance
WHITE PAPER: Discover how you can overcome the negative compliance and security side effects of deploying new communications and social channels in the pharmaceutical industry. Learn 6 ways to adopt these technologies while mitigating legal and security risks.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

Compliance Beyond Email: Navigating the Complexities within Healthcare
sponsored by Actiance
WHITE PAPER: This white paper explores how you can provide doctors and patients diverse communications coupled with strong compliance and data protection. Uncover 5 ways to mitigate legal and security risks in your healthcare organization.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

Addressing HIPAA Requirements for Electronic Communications
sponsored by Actiance
WHITE PAPER: Access this white paper and learn how you can enable seamless electronic communication in healthcare while meeting stringent compliance requirements, such as HIPAA, with 3 best practices.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Actiance

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Case Study: Data Management Fulfills Healthcare Compliance Requirements
sponsored by Commvault
VIDEO: Salem Health's Tim Woodland discusses how they switched to a data management solution that met their non-negotiable need for compliance. Uncover the 3 main benefits they gained, and how these improvements saved them money on data management.
Posted: 21 Apr 2016 | Premiered: 21 Apr 2016

Commvault

Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

IBM

Drawing business value from GRC analytics
sponsored by SearchCompliance.com
EBOOK: In this handbook, learn how companies are drawing business value from GRC analytics data and developing strategies to incorporate analytics best practices that benefit company-wide business processes.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

SearchCompliance.com

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper provides business planners with informative details on how to maintain strong security and PCI DSS compliance in a distributed retail environment. Access now for tools on how to keep applications, data and networks safe and PCI DSS compliant.
Posted: 15 Apr 2016 | Published: 01 Jan 2014

WatchGuard Technologies, Inc.

The CIO's Guide to Mainframes: Evaluating Sourcing Strategies to Mitigate Risk
sponsored by Windsor Group
WHITE PAPER: Discover in this guide how to formulate a sourcing strategy for your mainframe, starting with a baseline to identify how your decisions will affect staff, budgets, compliance, and cost, and align your outcome to current needs and future direction.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

Windsor Group

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.
Posted: 14 Apr 2016 | Published: 31 Dec 2013

IBM

Three Rules for Managing Email Compliance
sponsored by ArcMail Technology
WHITE PAPER: Discover 3 ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Email Compliance Rules for Government and Education
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, get an in-depth look at how to ensure compliance for email within government and education sectors. Explore how compliant you are by leveraging a self-assessment, discover the legal hurdles you have to be aware of to deal with compliance effectively, and more.
Posted: 12 Apr 2016 | Published: 31 Dec 2011

ArcMail Technology

The Role of Metadata in a Data Governance Strategy
sponsored by ERwin
WHITE PAPER: Discover how your organization can use metadata for a comprehensive and effective data governance strategy.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

ERwin

Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Defending Hybrid Enterprises from Data Breaches and Insider Threats
sponsored by CA Technologies
WHITE PAPER: Even one improperly authorized privileged account can cause irreparable damage to your infrastructure, intellectual property, and reputation. This white paper reveals how you can implement an in-depth defense strategy to effectively manage privileged access across your hybrid enterprise.
Posted: 08 Apr 2016 | Published: 31 Dec 2015

CA Technologies

Top 10 Reasons to Select CA ERwin® Modeling
sponsored by ERwin
WHITE PAPER: This white paper shows you 10 reasons why you should use a data model to manage your multiple data sources.
Posted: 07 Apr 2016 | Published: 01 Mar 2016

ERwin

Overcoming Data Sovereignty and Security Challenges with the Cloud
sponsored by PEER 1
WHITE PAPER: Access this valuable resource now and learn how to stay ahead of data residency laws, ensure you are storing data correctly, and safeguard your customer's data and ensure that its sovereignty remains intact.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

PEER 1

Infographic: Content Management Challenges and Strategies
sponsored by EMC
WHITE PAPER: Learn how one organization updated their manual paperwork processes to include automated capture, management, and workflow, allowing them to reduce errors and improve regulatory compliance.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

EMC

How to Keep Cloud Services Compliant with HIPAA Standards
sponsored by Actiance
EGUIDE: In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Actiance

Security and Compliance: Two Must-Haves for Federal Data Center Environments
sponsored by CyrusOne
CASE STUDY: Access this case study to discover how your organization can achieve secure and compliant data center colocation. Read on to meet your evolving data center infrastructure requirements, and deliver the reliability your mission-critical IT environments demand.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

CyrusOne

How HealthEast Care System Achieved EPCS Success
sponsored by Imprivata
VIDEO: In this short video, hear from key IT and clinical decision makers at HealthEast Care System as they describe how they achieved an efficient way to safely and securely electronically prescribe controlled substances.
Posted: 25 Mar 2016 | Premiered: 29 Feb 2016

Imprivata

Free Download: BladeLogic Server Automation Trial
sponsored by BMC
TRIAL SOFTWARE: See how you can accelerate vulnerability resolution, lower costs of remediation and avoid major security incidents. Achieve real-time visibility into vulnerability health of IT environment.
Posted: 22 Mar 2016 | Premiered: 21 Mar 2016

BMC
1 - 25 of 558 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement