Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
1 - 25 of 529 Matches Previous Page  |  Next Page
10 Best Practices for Log Management & Analytics
sponsored by Logentries
WHITE PAPER: Log management has become a key aspect of IT operations in the wake of the massive growth of machine-generated data. Inside, discover 10 best practices for managing and gaining insight from your log systems. Learn how to set a data management strategy, structure your log data, separate and centralize that data, and much more.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

Logentries

Using Logs to Address Compliance Standards
sponsored by Logentries
WHITE PAPER: In this white paper, learn common log requirements in 3 major industries, what to look for in a log management tool, real-world examples of how to use a log management system for investigative issues, and more.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

Logentries

How to Create a Holistic Strategy for Office 365 Data Protection
sponsored by AvePoint, Inc.
WHITE PAPER: Learn how to make security part of your regular workflow with tools that help integrate compliance into everyday business use of Office 365. Discover how to minimize the risk of a breach and ensure uninterrupted user workflow by baking in compliance tools from the beginning.
Posted: 23 Dec 2016 | Published: 30 Nov 2016

AvePoint, Inc.

Life After Spreadsheets: 5 Strategies To Bring Your Business Back To Life
sponsored by Sage Software
RESOURCE: This resource explores a new 5-step strategy to gain better control of your assets. Discover how investing in a new asset management system, revising your internal process for compiling data, developing a long-term financial strategy, and more can help you move away from spreadsheets.
Posted: 21 Dec 2016 | Published: 21 Dec 2016

Sage Software

Two-Factor Authentication Helps Officers Protect and Serve New York
sponsored by BlackBerry
WHITE PAPER: Learn how field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents and keep their database safe.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Blue Coat Cloud Data Protection Gateway
sponsored by Blue Coat Systems
WHITE PAPER: Learn how to ensure CJIS compliance when using Salesforce.com and other SaaS applications to maintain control over your data on the cloud. Discover the benefits of this approach such as FIPS-140 compliance, seamless user experience, and more.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

Blue Coat Systems

Discover the Cloudification of Healthcare IT
sponsored by Pure Storage
RESOURCE: Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Pure Storage

Security Analytics Brings Data-Driven Security Into The 21st Century
sponsored by FireMon
RESOURCE: With security analytics, security professionals see opportunities for faster incident response, more efficient staff and better business alignment. In this Forrester report, learn how you too can streamline security operations using SIEM systems and enable more efficient, data-centric threat analysis.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

FireMon

ECM Tools Help Companies Overcome Content Challenges
sponsored by Webinfinity
EGUIDE: In this expert guide, learn how enterprise content management (ECM) tools help enterprises of all size capture, analyze, index, and store content. Inside, learn about the evolving features of ECM, how these systems are developing to fit every aspect of your enterprise, the current state of the ECM tools market, and more.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Webinfinity

Best Practices for E-Discovery and Regulatory Compliance
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This Osterman Research white paper offers some best practices for how organizations can meet compliance requirements using Office 365. Find out how integrating 3rd party programs can build compliance capabilities in environments that operate in both Microsoft and non-Microsoft programs.
Posted: 28 Nov 2016 | Published: 30 Sep 2016

Proofpoint, Inc.

The Future Of Data Security And Privacy: Growth And Competitive Differentiation
sponsored by Absolute
ANALYST REPORT: Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.
Posted: 22 Nov 2016 | Published: 07 Jul 2016

Absolute

Meet New Banking Regulations Without Losing Profitability With Liquidity Optimization
sponsored by SAS
WHITE PAPER: In this white paper, discover software that can help you comply to new banking regulations without compromising your profitability. This program offers a single data model for managing liquidity risk, optimization capabilities, a risk engine to help you prepare for multiple scenarios, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

A Path to Good Risk Taking Through Data Analytics
sponsored by SAS
WHITE PAPER: This white paper explores the strategic benefit of making analytics an integral part of your risk management plan. Inside, learn 11 principles for enhancing risk management and the way banks are currently leveraging analytics for risk assessment. You'll also find some risk management success stories.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

Cb Defense: PCI DSS Anti-Virus Assessment
sponsored by Carbon Black
WHITE PAPER: This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Carbon Black

A Guide for Building PCI DSS & HIPAA Compliant Businesses in the Cloud
sponsored by ThreatStack
WHITE PAPER: Where do you begin your cloud compliance journey? In this guide, learn to better understand the complexities of cloud compliance requirements, without all the headaches and confusion. Uncover how compliance differs in the cloud, why security monitoring is critical to achieving compliance, and more.
Posted: 01 Nov 2016 | Published: 01 Nov 2016

ThreatStack

Holistic Data Protection Center: Reduce Your Costs and Downtime
sponsored by Commvault
VIDEO: Access this video case study to learn how Salem Health implemented a stronger data protection strategy to minimize downtime, accelerate recovery, reduce costs, and achieve compliance with ease.
Posted: 31 Oct 2016 | Premiered: 31 Oct 2016

Commvault

Uncheck Yourself: Build a Security-First Approach to Avoid "Checkbox" Compliance
sponsored by Armor
WHITE PAPER: This white paper helps you understand compliance as simply a reporting function of a sound security posture. By devoting adequate resources to countering today's threats, you'll find that your organization can meets all or nearly all compliance requirements, simply by following sound security practices.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Armor

Game Over: 3 Scenarios Where Compliance Isn't Enough
sponsored by Armor
WHITE PAPER: Discover 3 real-world "game over" scenarios to show you why simply being compliant isn't enough. Learn why compliance is just a basic first step, highlighting the need for real, proactive and ongoing security controls.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Armor

Security & Compliance Are No Gamble
sponsored by Armor
CASE STUDY: Discover how the gaming industry was able to create a more efficient, streamlined flow of processes and get military-grade security for sensitive information. Learn how your organization can reach the same level of compliance and security while allowing authorized parties to access data easily.
Posted: 25 Oct 2016 | Published: 30 Sep 2016

Armor

Block Threats with Multiple Cybersecurity Layers
sponsored by Armor
WHITE PAPER: Discover how to keep your sensitive data safe and your business up and running without interruptions. Ensure your organization, customers and sensitive data are protected by leveraging a defense-in-depth strategy that is designed with integrated security from the ground up.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

Armor

Achieve Both Compliance and Innovation
sponsored by Chef Software
WHITE PAPER: Discover how it's possible to achieve both compliance and innovation. Learn how compliance can become simply another step on the assembly line and the idea of infrastructure as code, which allows your enterprise to specify its compliance-related requirements in ways that can be automatically tested.
Posted: 21 Oct 2016 | Published: 01 Jun 2016

Chef Software

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PRESENTATION TRANSCRIPT: Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Citrix and Pure Storage

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

Transforming Finance Processes for the Digital Economy
sponsored by SAP
WHITE PAPER: Finance is at the heart of the digital business, but the financial processes and technology platforms that have been utilized in the last 20 years aren't agile enough for the digital economy. Access this white paper to explore a modern approach to managing critical processes like planning and analysis, risk management, compliance, and more.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

SAP
1 - 25 of 529 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement