Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
126 - 150 of 644 Matches Previous Page  | Next Page
Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

Protect Your Brand with Alert Logic PCI DSS Compliance Solutions
sponsored by Alert Logic
WHITE PAPER: This product brief outlines Alert Logic's cloud-powered solutions and the unique benefits offered to help eliminate the burden of PCI compliance.
Posted: 13 Jun 2014 | Published: 30 Jun 2012

Alert Logic

Swimming with the Current: Six Major Trends in Workforce Management Compliance
sponsored by Workforce Software
WHITE PAPER: This white paper provides an overview of the major trends affecting workforce management compliance. Discover tips and recommendations to help your organization cultivate a culture of compliance.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Workforce Software

Workflow, governance and reporting – Solvency II
sponsored by IBM
WHITE PAPER: The following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more.
Posted: 23 May 2014 | Published: 23 May 2014

IBM

Chartis - The Risk Enabled Enterprise - Global Survey Results and Two-year Research Agenda
sponsored by IBM
WHITE PAPER: The following white paper explores the various challenges associated with enterprise risk management and introduces a number of strategic initiatives that can be applied to cope with these obstacles. Learn the 4 integral parts to an ERM program and much more.
Posted: 23 May 2014 | Published: 23 May 2014

IBM

Overcoming Today's Compliance and Security Data-Related Challenges
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges.
Posted: 21 May 2014 | Published: 21 May 2014

Hexis Cyber Solutions Inc

5 Cornerstones of Compliance
sponsored by Datto, Inc.
WHITE PAPER: This resource highlights the 5 cornerstones of compliance and gives you the facts on a security strategy designed to meet a diverse set of MSP needs.
Posted: 16 May 2014 | Published: 31 Dec 2013

Datto, Inc.

Ensuring Compliance and Defensibility with Automated Classification
sponsored by OpenText
WHITE PAPER: This white paper provides an overview of key factors your organization must consider when evaluating potential strategies for automated classification to ensure compliance and defensibility.
Posted: 16 May 2014 | Published: 16 May 2014

OpenText

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Achieving ROI from your Enterprise Archiving
sponsored by OpenText
WHITE PAPER: As the volume of enterprise information increases exponentially, enterprise archiving strategies become ever more critical. Consult this resource to learn how to determine archiving ROI and discover the nine most important questions to ask when considering your archiving priorities/associated cost savings and risk.
Posted: 15 May 2014 | Published: 30 Apr 2014

OpenText

Take Control of Your PST Problem
sponsored by Dell Software
WHITE PAPER: Read this tech brief to find out how Dell Migration Manger can help you alleviate administrative and compliance challenges created by an abundance of PST files on employee desktops.
Posted: 06 May 2014 | Published: 07 May 2013

Dell Software

One Easily Avoidable Pitfall in Your eDiscovery and Compliance Strategy
sponsored by CommVault
WHITE PAPER: This white paper explains the challenges of big data and highlights one common pitfall organizations fall into when dealing with their eDiscovery and Compliance strategy. It also highlights how a solution from CommVault can help avoid this pitfall by delivering searchable endpoint data for more comprehensive searches.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

CommVault

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Facilitating Enterprise Compliance With Globalscape® EFT™ and the High-Security Module
sponsored by GlobalScape
WHITE PAPER: In this white paper, discover how Enhanced File Transfer (EFT™) High Security module (HSM) combined with the Auditing and Reporting module (ARM) remains compliant to a variety of standards including PCI DSS.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

GlobalScape

Managing IBM License Complexity
sponsored by Flexera Software
WHITE PAPER: In this white paper, examine the most common IBM license models under three categories -- user-based, capacity-based, and "other" -- along with helpful examples. Plus, discover a discovery, inventory and license management tool that simplifies and automates IBM license management.
Posted: 23 Jun 2014 | Published: 31 Dec 2011

Flexera Software

Comply and Compete: Model Management Best Practices
sponsored by FICO
WHITE PAPER: The following white paper explores how by using a centralized automated model management solution, you can comply with increased scrutiny from bank regulators and at the same time, improve your segmentation transparency, document management, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

FICO

Anypoint Platform Cloud Security & Compliance
sponsored by MuleSoft
WHITE PAPER: This white paper addresses the security and compliance of a cloud services platform, and goes in depth into operations, passwords and credentials, on-premise security, and more.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

MuleSoft

Top 10 Reasons Australian Businesses Automate Their Expenses
sponsored by Concur Technologies
WHITE PAPER: The following white paper explores the top 10 reasons why businesses need to consider automating their travel and expense management processes. Learn how you can gain 28% faster approval processes, 22% greater policy compliance, 40% cost reduction, and more.
Posted: 10 Jun 2014 | Published: 10 Jun 2014

Concur Technologies

CFO Insights on Success: Preparing for 2015 and Beyond and How Automation Can Help
sponsored by Concur Technologies
WHITE PAPER: The following white paper to explore the current challenges and bottlenecks that face CIOs and FDs at the financial year-end. Learn the importance of automation technology and how it can drastically improve visibility, reporting, and ultimately, a simpler year-end.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Concur Technologies

Smart Changes, Big ROI: Leading Companies Automate Their Record-to-Report Processes
sponsored by IBM
WHITE PAPER: The following white paper explores the 3 big areas companies need to address in order to improve their reporting accuracy and accounting. Learn how industry innovators are using automation to gain the reporting prowess they need. Also explore technology recommendations and more.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

IBM

Enterprise Vault Archiving Overview
sponsored by Symantec Corporation
VIDEO: This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

IBM

Hightail Security: Securing Information in the New World
sponsored by Hightail
WHITE PAPER: The following white paper explores a file sharing solution that gives users the ability to share files easily, while providing IT with the required security infrastructure, comprehensive controls, and data tracking capabilities needed in today's data-driven business environment.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Hightail

Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
sponsored by Symantec Corporation
WHITE PAPER: This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
Posted: 24 Apr 2014 | Published: 31 Jan 2014

Symantec Corporation
126 - 150 of 644 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement