Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 583 Matches Previous Page  |  Next Page
Fundamental Review of the Trading Book Standardised Model Approach From SAS®
sponsored by SAS
WHITE PAPER: The new standardized model from the FRTB will have a massive impact on financial institutions of all sizes and is already creating compliance challenges. Uncover an innovative and cost-effective route to gaining regulatory compliance. Plus, discover the technology that will simplify implementation of the standardized model.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

SAS

The Four Steps to Effective Risk and Compliance Management for Financial Services
sponsored by IBM
WHITE PAPER: This white paper illustrates why convergence is key to maximizing governance efforts and provides 4 steps financial services organizations can take to mitigate compliance risks.
Posted: 22 Jul 2016 | Published: 31 May 2011

IBM

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

Oracle Compliance: Challenges and Solutions
sponsored by Matrix42
WEBCAST: This question-and-answer video features advice for complying with Oracle database licensing challenges that are becoming more common. Find out the best way to get relevant information from your Oracle instances to properly prepare for audits.
Posted: 14 Jul 2016 | Premiered: Jul 14, 2016

Matrix42

4 Cybersecurity Trends that Might Be Affecting Your Organization
sponsored by Navex Global
ANALYST REPORT: In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.
Posted: 13 Jul 2016 | Published: 04 May 2016

Navex Global

Mobility In Financial Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover a checklist towards regulatory compliance on achieving regulatory compliance for mobility/EMM initiatives. Uncover key considerations, such as: what questions you should be asking your RFP/RFQ to EMM vendors, understanding who the key regulators are and their areas of interest, and more.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

BlackBerry

A Top 10 Bank Uses Infogix to Manage Operational Risk
sponsored by Infogix
WHITE PAPER: Learn the tool a Top 10 Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including: reduced costs while increasing productivity, processed full audit in real time, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2014

Infogix

IT Compliance and Security: Reduce Security Exposure from Months to Minutes
sponsored by BMC
VIDEO: Learn how security and operations teams can more readily embrace key business initiatives by maintaining a posture of "audit ready all the time," using analytics for a stronger security stature, and mitigating risks.
Posted: 08 Jul 2016 | Premiered: 08 Jul 2016

BMC

Smarter Commerce Spells Sweet Success for Gourmet Baker
sponsored by VAI, Vormittag Associates, Inc.
WHITE PAPER: Read this "Food Logistics" article to find out how, with the help of an IT vendor, a gourmet bakery called Love & Quiches overcame poorly integrated applications and the limitations of spreadsheets for record management. Learn how the ERP system Love & Quiches adopted afforded them compliance efficiencies, improved forecasting, and more.
Posted: 08 Jul 2016 | Published: 31 Dec 2015


Oracle Audit Defense Management
sponsored by Miro Consulting, Inc.
WHITE PAPER: No one likes audits, but considering that 75% of software vendors believe that their customers don't manage their software license effectively, they're bound to happen. This white paper answers your questions about Oracle software audits, and provides 7 steps to successfully navigating through Oracle audit defense management.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Miro Consulting, Inc.

Establishing Energy as Enterprise Currency
sponsored by Infor
WHITE PAPER: Access this white paper to learn how you can minimize costs and risks of managing energy costs using certain best practices as well as enterprise asset management technology.
Posted: 06 Jul 2016 | Published: 31 Dec 2012

Infor

Breakthrough Security and Compliance Practices for the Digital Enterprise
sponsored by BMC
WHITE PAPER: A comprehensive, aggressive automation strategy helps to sustain a high level of security and compliance. Discover ways to make automation a strategic asset in the fight against cyberthreats.
Posted: 05 Jul 2016 | Published: 05 Jul 2016

BMC

Demo: Configuring HIPAA EDI Envelopes (Part 1)
sponsored by IBM
VIDEO: In Part 1 of this 3-part series, IBM Product Architect Stephanie Fetzer explains HIPAA envelope configuration using the Transformation Extender Advanced (previously known as Standards Processing Engine). Using the analogy of sending a postal package, Stephanie shows the configuration process in three simple steps.
Posted: 30 Jun 2016 | Premiered: 22 May 2014

IBM

What Does Employee Scheduling Have to Do with Employee Costs?
sponsored by Kronos Incorporated
WHITE PAPER: Misjudgments in employee scheduling can directly impact your labor costs, productivity, and profitability. This white paper provides a look at a scheduling tool that automates tasks, enabling you to align labor with demand, control costs, and meet compliance requirements in an accurate and timely fashion.
Posted: 30 Jun 2016 | Published: 31 Dec 2014

Kronos Incorporated

Big data business intelligence
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: The ability to access, analyze and extract information assets more efficiently than the competition has become a vital business driver in the big data age. In this classroom, learn how to use information governance to draw business value and intelligence from big data.
Posted: 29 Jun 2016 | Premiered: 16 May 2016

SearchCompliance.com

Connected Health Cloud (CHC)
sponsored by CloudMine
WHITE PAPER: In this resource we identify the 3 major hurdles to predictive, personalized healthcare, and how the industry itself can overcome them.
Posted: 29 Jun 2016 | Published: 29 Feb 2016


HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: A comprehensive managed file transfer solution provides off-the-shelf integration with common security products and end-to-end visibility into and monitoring of file transfers. It will help you ensure the rapid onboarding of new customers and partners, as well as governing interactions with trading partners.
Posted: 20 Jun 2016 | Published: 01 May 2016

Axway

Lighting a Path to PCI Compliance
sponsored by Illumio
WHITE PAPER: Adaptive Security Platforms (ASP) can ensure PCI compliance and audit preparation across a wide spectrum of standards. Read on to uncover how your enterprise can protect cardholder data, implement strong access control measures, maintain an information security policy, and more.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Illumio

2016 Security Buyer's Guide
sponsored by Illumio
WHITE PAPER: Access a step-by-step guide, complete with checklists, for adaptive security buyers in 2016. This guide will allow enterprises to pre assess their security posture, discover gaps, and evolve their strategy to better suit the hybrid-cloud environment.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio

Security Considerations for Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how endpoint compliance should be enforced in the mobile era. Access now and you'll also explore considerations that are critical for ensuring a secure network.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Client Virtualization Solutions For Government Deliver Increased Security, Mobility, and Savings
sponsored by Dell and VMware
WHITE PAPER: Find out how client virtualization can address the unique requirements of government agencies and learn how moving sensitive data from local device storage to the data center helps to control costs, protect data and applications, support the secure mobile workforce, and more.
Posted: 02 Jun 2016 | Published: 04 May 2016

Dell and VMware

Four security tips for HIPAA compliance in healthcare cloud storage
sponsored by Pure Storage
EGUIDE: No risks can be taken when it comes to healthcare information storage. This is deterring many healthcare IT professionals from taking advantage of cloud storage opportunities. Read on to uncover four security tips that will keep your healthcare cloud storage in compliance with HIPAA standards.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage
1 - 25 of 583 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement