Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
1 - 25 of 569 Matches Previous Page  | Next Page
Nationwide commercial uses Qlikview for portfolio-level analytics and business discovery
sponsored by QlikTech, Inc.
CASE STUDY: Nationwide Commercial needed a way to analyze predictions for future loan behavior, improve ease of compliance, mitigate risk, improve capital consumption, and maximize returns. The following report examines how QlikView was able to help them attain these goals and ultimately, what you can do to achieve similar results.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

QlikTech, Inc.

Reduce your software spend - HP Software Licensing and Management Solutions (SLMS)Software Asset Management (SAM)
sponsored by Hewlett-Packard Limited
WHITE PAPER: Decreasing budgets are forcing enterprises to demand services that are tailored to fit specific business requirements. This whitepaper considers one SLMS option that covers cloud, virtualization, mobility, and BYOD. View now to see the results some companies have seen.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

Hewlett-Packard Limited

Optimize your software investment - HP Enterprise Software Licensing and Management Solutions (SLMS)
sponsored by Hewlett-Packard Limited
WHITE PAPER: It is increasingly difficult for enterprises to purchase and deploy assets using a multitude of vendors, devices and platforms. This whitepaper discusses software licensing and management solutions (SLMS) and the advantages of systems like this.
Posted: 21 Aug 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited

Expert Tips for Compliance and Managing Employee Data
sponsored by IBM
EGUIDE: This expert e-guide covers the key drivers behind the move to Software-as-a-Service (SaaS) and cloud-based applications, as well as important considerations to keep in mind when evaluating your choices. As you read, learn how to craft a comprehensive request for proposal (RFP) and overcome ongoing compliance and management challenges.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Limited
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Limited

Fax Security: Minimizing Breaches and Compliance Risks
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Automating and Securing Healthcare Information with Cloud-Based Fax Messaging
sponsored by OpenText
WHITE PAPER: Learn how this cloud-based fax messaging solution will secure patients' information at a low cost and meets federal regulations.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Bit9 Case Study Portfolio: Advanced Threat Protection in Action
sponsored by Bit9 + Carbon Black
WHITE PAPER: Download the Bit9 + Carbon Black case study portfolio now to learn how 12 of your fellow retailers and hospitality organizations are addressing today's advanced threats targeting their point-of-sale (POS) systems.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bit9 + Carbon Black

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9, Inc.
WHITE PAPER: Explore this brief paper that highlights 10 best practices to protect your company from a data breach while maintaining required PCI compliance (hint: all of these tips fall under these topics – visibility, asset control, enforcement, trust policy, and advance measurement).
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bit9, Inc.

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: In this white paper, discover a mobile security solution that provides containerization, application-wrapping and secure connectivity to healthcare organizations, helping prevent data breaches and meet compliance regulations.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

BlackBerry

The Convergence of Security and Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This informative paper highlights potential compliance and security gaps, what effect these gaps can have on your organization, and how to close these gaps to bolster the security of servers and endpoints. Additionally, explore a discussion around 5 core compliance controls.
Posted: 18 Aug 2014 | Published: 31 Jul 2014

Bit9, Inc.

Meet Compliance Guidelines Effectively with Log Management Solutions
sponsored by LogRhythm, Inc.
WHITE PAPER: In this in-depth guide, learn how to more efficiently meet compliance recommendations with new log management and analysis solutions.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

LogRhythm, Inc.

Mobile Security: Overcoming Obstacles, Reducing Risk
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: Join ISACA, SearchCompliance.com, SearchSecurity.com and thousands of your fellow IT peers from around the world for a live virtual seminar, taking place on September 17th 2014, on how to secure your mobile workplace without sacrificing the business needs of end users.
Posted: 14 Aug 2014 | Premieres: Sep 17, 2014

SearchSecurity.com

Mobile Security: Getting Past No to Yes
sponsored by Bluebox
WEBCAST: This webcast reveals how focusing on mobile security can improve your organization, specifically because of the booming emergence of the mobile market.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Bluebox

Technology Tools and Policies for Corporate Compliance
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, we examine the technology tools and policies organizations are implementing as part of a wide-ranging corporate compliance program.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchCompliance.com

Make Archiving an Enterprise Advantage
sponsored by EMC Corporation
WHITE PAPER: In this helpful white paper, uncover the best strategies for reducing expenses and removing IT storage complexity, including techniques like rationalizing application portfolios and decommissioning legacy systems.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

EMC Corporation

Combining Security and the Cloud to Enhance Your Business
sponsored by GFI Cloud
EBOOK: This resource highlights the views of several tech influencers pertaining to security and the cloud. Each person provides valuable insight and explains how to implement them both into your business.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

GFI Cloud

Attensity: Insurance Case Study
sponsored by Attensity
CASE STUDY: The following case study reveal the solution that a multi-billion dollar financial services company used to make faster, more accurate claim decisions, assign specialists to high-risk claims earlier in the process cycle, decrease the impact of insurance fraud, and more.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Attensity

Managing BitLocker With SafeGuard Enterprise
sponsored by Sophos, Inc.
WHITE PAPER: This informative white paper highlights a unified tool to manage device encryption, compliance and Microsoft BitLocker, no matter where your organization's data is stored. Don't limit your encryption to full-disk; let your users take your data with them and know that it will be protected wherever they go. Read on now to learn more.
Posted: 08 Aug 2014 | Published: 31 Jan 2014

Sophos, Inc.

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: This in-depth whitepaper outlines a log management solution which can eliminate many of the complexities of information security while maintaining the integrity of computing resources.
Posted: 07 Aug 2014 | Published: 31 Dec 2012

IBM

Easy and Secure Privileged Password and Session Management
sponsored by BeyondTrust Corporation
DATA SHEET: This resource outlines an automated password management solution that offers access control and auditing for any privileged account.
Posted: 06 Aug 2014 | Published: 31 Jul 2014

BeyondTrust Corporation

Implement a Risk Management Platform to Dodge Vulnerabilities
sponsored by BeyondTrust Corporation
WHITE PAPER: This resource introduces a collaborative approach to IT risk management by integrating two security methodologies: privileged account management and vulnerability management.
Posted: 05 Aug 2014 | Published: 30 Jan 2014

BeyondTrust Corporation

Logicworks HIPAA Compliant Healthcare Cloud
sponsored by Logicworks
VIDEO: This short video explains how Logicworks provides a solution that manages millions of patient health records from around the world—while designing, deploying and managing hosted private and hybrid cloud infrastructures
Posted: 05 Aug 2014 | Premiered: 05 Aug 2014

Logicworks

Cloud Is Not (Always) The Answer
sponsored by Logicworks
WEBCAST: Learn why the cloud isn't always the best option, especially within a healthcare organization.
Posted: 04 Aug 2014 | Premiered: Jul 14, 2014

Logicworks

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.
1 - 25 of 569 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement