Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
201 - 225 of 536 Matches Previous Page  | Next Page
E-Guide: Tips for protecting hard-copy records
sponsored by Iron Mountain
EGUIDE: Do you know why and how you should include hard-copy records in your disaster recovery and business continuity plan?
Posted: 26 Sep 2012 | Published: 10 May 2012

Iron Mountain

Tape Backup: Then and Now
sponsored by Iron Mountain
WEBCAST: This video explores the key reasons to re-evaluate tape and discusses why it is well suited for archiving, legal discovery, tiered environments, and other scenarios.
Posted: 26 Sep 2012 | Premiered: Sep 17, 2012

Iron Mountain

The Compliance Case for Social Media Records Management
sponsored by Iron Mountain
EGUIDE: In this e-guide, learn how your organization can develop a solid records management policy to stay compliant while reaping social networking benefits.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

Iron Mountain

Overcoming the Modern Challenges to Corporate Records Management
sponsored by Iron Mountain
PODCAST: In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends.
Posted: 20 Sep 2012 | Premiered: Aug 30, 2012

Iron Mountain

CW Buyer's Guide: Data Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force
Posted: 14 Sep 2012 | Published: 05 Apr 2012

ComputerWeekly.com

Information governance: Reduce risk and improve compliance
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs.
Posted: 29 Aug 2012 | Published: 29 Aug 2012

Iron Mountain

Survive the Scrutiny of Litigation:Rediscover Records Management
sponsored by Iron Mountain
EBOOK: Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management.
Posted: 28 Aug 2012 | Published: 27 Aug 2012

Iron Mountain

5 Keys to Records Management Implementation
sponsored by Iron Mountain
EGUIDE: This e-guide demonstrates how you can simplify the initial stages of records management implementation. Read now for five strategies that are sure to help you get your feet off the ground.
Posted: 27 Aug 2012 | Published: 27 Aug 2012

Iron Mountain

Iron Mountain Customers Share Compliance, Litigation and Discovery Best Practices
sponsored by Iron Mountain
WHITE PAPER: This paper showcases how customers of the world's largest records management consulting practice address their own compliance and discovery requirements with the help of this company's intellectual property, practical advice and best practices. Read on to access short testimonials and descriptions of the services available.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

Protecting Your Information as if It Were Our Own
sponsored by Iron Mountain
WHITE PAPER: This resource introduces the security practices and information security services of an information management services provider intent on providing unparalleled protection of assets, comprehensive security assurance and industry-leading expertise. Read on to discover a potential information management partner now.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

Smart, Visible and Automated: The New Log Management
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!
Posted: 27 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Tripwire, Inc.

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Limited
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Limited

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

Symantec Enterprise Vault
sponsored by Symantec Corporation
WHITE PAPER: Check out this short white paper to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.
Posted: 07 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Top 10 Reasons to Archive Information with Symantec Enterprise Vault 10
sponsored by Symantec Corporation
WHITE PAPER: This short white paper lists the top 10 reasons to archive information with Symantec Enterprise Vault 10. Read now to see how you can bring your archives up to speed so that you can reduce costs, ensure you're in compliance, and make backup and recovery a breeze.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Top 5 Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
WHITE PAPER: This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010

Symantec Corporation

Solutions to Meet your PCI Compliance Needs
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

Select the right solution for endpoint management
sponsored by IBM
WHITE PAPER: Selecting the best form of endpoint security for your business can seem like an impossible challenge. Consult this informative white paper to learn more about getting started with endpoint management. It outlines features and capabilities that contribute to an effective endpoint management solution for your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

IBM

EMA Analyst Report on the Mobile Device Management Marketspace
sponsored by IBM
WHITE PAPER: Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

IBM

Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER: By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011

IBM

Research Report: Understand the True Cost of Data Encryption - Like Never Before
sponsored by WinMagic
RESEARCH CONTENT: World renowned Dr. Larry Ponemon, chairman of the Ponemon Institute presents the ground-breaking results of this revolutionary study on the True Cost of Data Encryption. Read this research report to learn how organisations around the world can lower the total cost of IT ownership while protecting their devices - with WinMagic data encryption.
Posted: 16 Aug 2012 | Published: 16 Aug 2012

WinMagic

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Cloud Encryption Gateway: Overcoming Cloud Security and Compliance Concerns
sponsored by CipherCloud
WHITE PAPER: Learn how CipherCloud protects data in Salesforce, Gmail, and Office 365. Find out how the solution sits between your users and your cloud applications and applies AES-256 encryption on the fly before sensitive data leaves the enterprise to provide protection without requiring changes to the cloud application or impacting application functionality.
Posted: 09 Aug 2012 | Published: 09 Aug 2012

CipherCloud
201 - 225 of 536 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement