Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
176 - 200 of 644 Matches Previous Page  | Next Page
How to Control your Software with Effective SAM
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

Software Asset Management: Pay Attention or Pay Up
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

The Expert's How-to on Vulnerability Management
sponsored by TechTarget
RESOURCE: How can enterprises get a better handle on vulnerabilities and ensure security issues aren't overlooked? With you in mind, we've created The Expert's How-to on Vulnerability Management which explores the steps you can take to develop a data breach incident response plan, the top five Web application vulnerabilities, and how to circumvent them.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

How To Successfully Achieve Records Management Compliance and Strategy
sponsored by Iron Mountain
EGUIDE: The following e-guide, created by the experts at SearchCompliance.com offers advice and tips on navigating the records management landscape as well as how to best assure records management compliance. Read on to learn more.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Iron Mountain

Best Practices for Organizational Records Management Strategy and Compliance Ready Records Retention Schedules
sponsored by Iron Mountain
EGUIDE: The following expert e-guide, created by experts at SearchCompliance.com explores the keys to a compliance ready records retention schedule as well as records management strategy such as researching and developing your policy. Read on to learn more.
Posted: 13 Mar 2014 | Published: 13 Mar 2014

Iron Mountain

Human Resources Document Management
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to examine several ways how you can off-load the time-consuming management of employee records, achieve a more rapid response to complex audit and discovery requests, mitigate risk, and protect vital documents.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

Iron Mountain

Testimonial: Cystic Fibrosis Trust
sponsored by CommVault
VIDEO: View the following webcast to reveal the solution Cystic Fibrosis Trust used to improve their information governance strategies that ultimately allowed them to decrease time to compliance, improve data insights, and more.
Posted: 07 Mar 2014 | Premiered: 07 Mar 2014

CommVault

Enhance Software License Compliance with Enterprise App Stores
sponsored by CDW Corporation
EGUIDE: This expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

5 Licensing Factors to Consider When Planning a Cloud Migration
sponsored by CDW Corporation
EGUIDE: This expert e-guide from SearchCloudComputing.com offers a primer on cloud licensing. Read on to learn about your options for cloud license management, five licensing factors to consider when planning a cloud migration, and more.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

PST Archiving: Your Employees' Dirty Little Secret
sponsored by CommVault
WEBCAST: This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files.
Posted: 06 Mar 2014 | Premiered: Jan 23, 2014

CommVault

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

5 eDiscovery Challenges Solved
sponsored by CommVault
WHITE PAPER: This quick solution brief addresses the top 5 eDiscovery obstacles that stand in your way.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

CommVault

Enterprise Information Archiving: Accelerating Time to Compliance
sponsored by OpenText
WEBCAST: Access the following webcast to join information expert, Greg Clark, as he reveals how to achieve information governance success. Discover what makes information worth keeping, tools to use, as well as expert strategies to quicken time to compliance.
Posted: 25 Feb 2014 | Premiered: Feb 25, 2014

OpenText

Enterprise Information Archiving: It’s Time for a New Strategy
sponsored by OpenText
WHITE PAPER: Access the following white paper to discover what poor archiving really is. Learn if you're keeping too much or too little, where to turn for cost-effective storage, and more.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

OpenText

Mom, Apple Pie, and the Office of Comptroller of the Currency
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
VIDEO: While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: 19 Feb 2014

Imperva

HP Security Solutions
sponsored by Hewlett-Packard Limited
VIRTUAL ENVIRONMENT: This informative virtual environment addresses how your organization can approach security with the same agility you apply to business. Videos, case studies, data sheets and more will help you understand how to best stay ahead of the breach.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Best practices in managing requirements in Energy and Utilities industries
sponsored by IBM
WEBCAST: This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Posted: 27 Mar 2014 | Premiered: May 31, 2013

IBM

Compliance in the Cloud: Myth or Reality
sponsored by SunGard Availability Services
WHITE PAPER: This expert resource covers a series of frequently asked questions about cloud providers and how they handle data protection and compliance.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SunGard Availability Services

For regulated industries: Learning within a multi-tenant SaaS architecture
sponsored by SuccessFactors
WHITE PAPER: This resource describes the need for compliance with Good Practice requirements in regulated industries, explores key challenges of the validation process for learning environments, and evaluates whether multi-tenant SaaS architecture is a viable option.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

SuccessFactors

Alternative Ways to Store Data
sponsored by Iron Mountain
EGUIDE: This expert e-guide covers some unconventional data center locations including under water. It will also advise you on how to do you due diligence in order to maintain compliance in the cloud.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Iron Mountain

The Ties That Bind
sponsored by SearchCIO.com
EGUIDE: Enterprise compliance and security departments should work together to achieve business goals. Find out how this tandem can battle the regulatory and IT threat landscape.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

SearchCIO.com
176 - 200 of 644 Matches Previous Page    6 7 8 9 10 11    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement