Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
176 - 200 of 521 Matches Previous Page  | Next Page
Where is the smart money going in ICT ?
sponsored by ComputerWeekly.com
WHITE PAPER: Despite the travails of the UK economy over the last year, most ICT businesses have continued to perform robustly, responding swiftly to any need to downsize their teams or evolving their business models in order to deal with a changing environment.
Posted: 29 Nov 2012 | Published: 24 Mar 2011

ComputerWeekly.com

De-risking IT Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Top 10 Predictions for 2013
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst Group, Nucleus Research gives its view of the IT trends and technologies that will shape 2013.
Posted: 16 Nov 2012 | Published: 16 Nov 2012

ComputerWeekly.com

Organizational development's influence on the e-discovery process
sponsored by SearchCompliance.com
VIRTUAL SEMINAR: In this tip, learn how organizational culture and structure influences e-discovery process.
Posted: 14 Nov 2012 | Premiered: 06 Nov 2012

SearchCompliance.com

Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop
sponsored by VMware, Inc.
WEBCAST: This webcast explores the issues with enabling BYOD in the workplace and provides details of a desktop virtualization-based solution that will help you securely support device diversity, mobile workers, and BYOD initiatives.
Posted: 25 Oct 2012 | Premiered: Aug 23, 2012

VMware, Inc.

12 Questions to Ask When Choosing an AD Bridge Solution
sponsored by Dell Software
WHITE PAPER: Find out the best ways to evaluate AD bridge solutions to help ensure maximum security, compliance and productivity.
Posted: 08 Oct 2012 | Published: 31 May 2012

Dell Software

Data Protection Masterclass: New EU Data Protection Regulation
sponsored by ComputerWeekly.com
PRESENTATION: Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

ComputerWeekly.com

The Compliance Case for Social Media Records Management
sponsored by Iron Mountain
EGUIDE: In this e-guide, learn how your organization can develop a solid records management policy to stay compliant while reaping social networking benefits.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

Iron Mountain

Overcoming the Modern Challenges to Corporate Records Management
sponsored by Iron Mountain
PODCAST: In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends.
Posted: 20 Sep 2012 | Premiered: Aug 30, 2012

Iron Mountain

CW Buyer's Guide: Data Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force
Posted: 14 Sep 2012 | Published: 05 Apr 2012

ComputerWeekly.com

Information governance: Reduce risk and improve compliance
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Iron Mountain

Survive the Scrutiny of Litigation:Rediscover Records Management
sponsored by Iron Mountain
EBOOK: Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management.
Posted: 28 Aug 2012 | Published: 27 Aug 2012

Iron Mountain

E-Discovery Cloud Considerations
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Symantec Corporation

Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by McAfee, Inc.
EGUIDE: This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

McAfee, Inc.

Archiving in the Cloud: Essential Tips and Questions to Answer
sponsored by Symantec Corporation
EGUIDE: Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation

Top considerations for manufacturing compliance software
sponsored by Epicor Software Corporation
EGUIDE: This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Epicor Software Corporation

A Pragmatic Approach to SIEM: Buy for Compliance, Use for Security
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper so you can gain a better understanding of the definition of SIEM and log management tools and what they can do for you. Find out more about the features of SIEM and what you should look for when selecting a product.
Posted: 01 Oct 2012 | Published: 01 Oct 2012

Tripwire, Inc.

Smart, Visible and Automated: The New Log Management
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!
Posted: 27 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Limited
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Limited

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Symantec Enterprise Vault
sponsored by Symantec Corporation
WHITE PAPER: Check out this short white paper to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.
Posted: 07 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Top 10 Reasons to Archive Information with Symantec Enterprise Vault 10
sponsored by Symantec Corporation
WHITE PAPER: This short white paper lists the top 10 reasons to archive information with Symantec Enterprise Vault 10. Read now to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Top 5 Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
WHITE PAPER: This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation
176 - 200 of 521 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement