Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
126 - 150 of 551 Matches Previous Page  |  Next Page
Why European Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks
WHITE PAPER: This white paper debunks common misconceptions about European data protection law, considers the characteristics of an excellent Managed Security Services Provider for data protection law purposes, and more.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks

Meet Licensing and Security Challenges With Software Asset Management
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Trends Shaping Software Management: 2014
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers the importance of addressing application compatibility and license agreements when dealing with the BYOD trend.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Exploring the Software Asset Management Landscape
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

Software Asset Management: Pay Attention or Pay Up
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

The Expert's How-to on Vulnerability Management
sponsored by TechTarget
RESOURCE: How can enterprises get a better handle on vulnerabilities and ensure security issues aren't overlooked? With you in mind, we've created The Expert's How-to on Vulnerability Management which explores the steps you can take to develop a data breach incident response plan, the top five Web application vulnerabilities, and how to circumvent them.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Testimonial: Cystic Fibrosis Trust
sponsored by CommVault
VIDEO: View the following webcast to reveal the solution Cystic Fibrosis Trust used to improve their information governance strategies that ultimately allowed them to decrease time to compliance, improve data insights, and more.
Posted: 07 Mar 2014 | Premiered: 07 Mar 2014

CommVault

Simple Strategies for BYOD Compliance
sponsored by CDW Corporation
EGUIDE: This expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

Importance of Information Governance for Records Managers
sponsored by RSD
WHITE PAPER: The following white paper explores the importance of information governance for records managers today. Uncover a solution to today's information governance needs and how a successful initiative can minimize risk, improve the value of information, and more.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

RSD

Importance of Information Governance for General Counsel and Legal Operations
sponsored by RSD
WHITE PAPER: The following white paper explores the importance of information governance, particularly in the realm of general counsel and legal operations. Learn how to grow from reactive to proactive governance, better manage laws and regulations, reduce cost, and more.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

RSD

Importance of Information Governance for IT Professionals
sponsored by RSD
WHITE PAPER: The following white paper explores the importance of information governance in today's market and provides a technology recommendation designed to keep the records you need to grow your business while safely disposing of unnecessary records, reducing storage costs, minimizing audits, and more.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

RSD

Importance of Information Governance for Business Users
sponsored by RSD
WHITE PAPER: The following white paper explores the importance of information governance of business users and provides technology recommendations that can meet with the compliance and data needs of today's market.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

RSD

Enabling the Business with Social Relationship Platforms
sponsored by Hootsuite
WHITE PAPER: Social media is quickly becoming a key part of enterprise business strategy. According to an IDG Research survey, 73% of respondents expect it to be critical or very important in the coming years. So how can CIOs prepare for and encourage the adoption of social media in the enterprise in a secure, compliant way?
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Hootsuite

Understanding E-Discovery Software Requirements
sponsored by Exterro
WHITE PAPER: This IT buyer's guide dives into eDiscovery software requirements by highlighting the capabilities commonly needed by IT teams and how a web-based legal process management software suite meets these requirements.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Exterro

Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER: This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Exterro

Data governance: Build a business case, get tips from the pros
sponsored by IBM
WHITE PAPER: In this report from the 2013 first annual summit of the Data Governance Forum, take a look at the highlights of the event and get key summaries from presentations given by data governance experts in both public- and private-sector organizations.
Posted: 08 Apr 2014 | Published: 30 Sep 2013

IBM

Decoding Predictive Technologies in E-Discovery
sponsored by Exterro
WHITE PAPER: This informative guide addresses common questions legal teams have about predictive technologies, and showcases how real-world users are taking advantage of these new capabilities.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Exterro

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

Expenses, VAT and HMRC Compliance in a Nutshell
sponsored by Concur Technologies
WHITE PAPER: 75% of senior finance leaders say they wish they knew more about employee expenses and VAT reclaim. If you're a member of that overwhelming population, then this e-book is for you. Download now to get a crash course on the often-misunderstood concepts of VAT, compliance, HMRC policies, and expenses.
Posted: 01 Apr 2014 | Published: 30 Nov 2013

Concur Technologies

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Best practices in managing requirements in Energy and Utilities industries
sponsored by IBM
WEBCAST: This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Posted: 27 Mar 2014 | Premiered: May 31, 2013

IBM

How To Successfully Achieve Records Management Compliance and Strategy
sponsored by Iron Mountain
EGUIDE: The following e-guide, created by the experts at SearchCompliance.com offers advice and tips on navigating the records management landscape as well as how to best assure records management compliance. Read on to learn more.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Iron Mountain

Best Practices for Organizational Records Management Strategy and Compliance Ready Records Retention Schedules
sponsored by Iron Mountain
EGUIDE: The following expert e-guide, created by experts at SearchCompliance.com explores the keys to a compliance ready records retention schedule as well as records management strategy such as researching and developing your policy. Read on to learn more.
Posted: 13 Mar 2014 | Published: 13 Mar 2014

Iron Mountain
126 - 150 of 551 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement