Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
126 - 150 of 570 Matches Previous Page  | Next Page
Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

Information Governance Symposium: Leverage predictive coding, analytics tech for information governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: Corporate data is one of an organization's most valuable assets, making a comprehensive information governance policy vital to bottom line success. Enter this interactive, online learning environment to gain information governance advice from several industry experts.
Posted: 28 Jan 2014 | Premiered: 31 Jan 2014

SearchCompliance.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

7 Steps To Getting A Handle On Social Application In Your Enterprise
sponsored by Jive Software
WHITE PAPER: Social media is a huge part of your employees' personal lives, so why shouldn't it be integrated into their work lives as well? While some executives might be wary of incorporating social media in the workplace, they really shouldn't be. With the right management tactics, you can get the benefits of social media while still remaining in control.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Jive Software

Simplifying eDiscovery & Compliance in the Big Data Era
sponsored by CommVault Systems, Inc.
WHITE PAPER: This resource offers practical insights and strategies to help you simplify eDiscovery and compliance in the age of big data and realize effective big data backup, archive, search, and analytics capabilities.
Posted: 07 Jan 2014 | Published: 31 Dec 2012

CommVault Systems, Inc.

Consumerisation and BYOD Purchasing Intentions Europe 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Understanding Your PCI DSS Guidelines: Successes and Failures
sponsored by SearchSecurity.com
EGUIDE: This expert guide form SearchSecurity.com details the PCI validation requirements for merchants covered by PCI DSS and reviews PCI's success and failures. Read on to learn what needs to be improved upon and what remains effective.
Posted: 13 Dec 2013 | Published: 13 Dec 2013

SearchSecurity.com

The Architecture of a Solid GRC Program
sponsored by RSA, The Security Division of EMC
WHITE PAPER: With businesses continue to focus on governance, risk and compliance (GRC), IT professionals have to maintain efficient security policies. This in-depth white paper outlines the importance of a GRC policy and how it can help your business.
Posted: 09 Dec 2013 | Published: 30 Jun 2013

RSA, The Security Division of EMC

Breaking Through the GRC Value Ceiling
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, gain information to determine whether your governance, risk and compliance (GRC) tools have yet to maximize their full value, and discover 3 ways that you can go beyond to bring significant ROI.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

RSA, The Security Division of EMC

RSA GRC Customer Case Studies
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Read over 18 RSA GRC customer stories across a wide range of industries. These profiles explain how RSA Archer GRC solved a variety of GRC challenges and enabled successful compliance and risk programs.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

RSA, The Security Division of EMC

Why It’s Critical to Begin the Process of Unifying Physical and Electronic Records—Now!
sponsored by Iron Mountain
WHITE PAPER: Consult this expert white paper to uncover how to successful unify physical and electronic records. Discover the benefits and challenges with unification, and most importantly, learn what you can do to rive higher business value through this process.
Posted: 26 Nov 2013 | Published: 02 Dec 2013

Iron Mountain

Top Monitoring Tools to Help Meet Regulatory Compliance Standards
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain expert insight on how to remain vigilant in meeting regulatory compliance standards, and uncover top compliance monitoring tools for financial institutions to meet their industry-specific regulations.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

SearchSecurity.com

The trust advantage: How to win at big data
sponsored by ComputerWeekly.com
ANALYST REPORT: Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

COBIT5 For Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is a preview of a  report from ISACA offering guidance on how to use the COBIT 5 framework to establish the risk governance and management functions for the enterprise.
Posted: 01 Nov 2013 | Published: 19 Nov 2013

ComputerWeekly.com

Information Governance Symposium: Information Governance Best Practices
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn tips and strategies to incorporate information governance into everyday businesses processes, including best practices to implement company-wide data management policies and metrics to help measure the success of information governance efforts.
Posted: 24 Oct 2013 | Premiered: 05 Nov 2013

SearchCompliance.com

Moving Up the Software License Optimization Maturity Curve to Drive Business Value
sponsored by Flexera Software
WHITE PAPER: Defining and implementing a strategy for software asset management (SAM) and license optimization isn't easy -- but with the right tools and processes, it's definitely possible. Access this informative resource to explore the common challenges of SAM, and how you can ensure your software license optimization program is on its way to full maturity.
Posted: 18 Oct 2013 | Published: 28 Feb 2013

Flexera Software

Compliance Guide: Ensure Social Media Compliance Across Your Organization
sponsored by Hootsuite
WHITE PAPER: Whether you're in the financial, medical, or other industry, there are unique regulatory and legal requirements to consider when interacting on social media. In this informative resource, learn how a social relationship platform can help you manage all the areas of social media compliance,
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Hootsuite

PCI DSS v3.0: How to Adapt your Compliance Strategy
sponsored by AlienVault
WEBCAST: With version 3.0 of PCI DSS now available, it's time to review your compliance strategy and make a plan for adapting to the revised requirements. View this webcast to learn more about the significant changes related to malware defenses, vulnerability assessments and penetration testing.
Posted: 20 Dec 2013 | Premiered: Dec 20, 2013

AlienVault

Three Guiding Principles to Improve Data Security and Compliance
sponsored by IBM
WHITE PAPER: In this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.
Posted: 19 Dec 2013 | Published: 31 Oct 2012

IBM

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013

Infoblox

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute Software

Reducing the costs and risks of data storage in the federal government
sponsored by IBM
WHITE PAPER: This resource introduces a storage and data management approach that helps reduce storage costs and risks, increase data protection, and much more.
Posted: 29 Oct 2013 | Published: 30 Jun 2012

IBM

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText
126 - 150 of 570 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement