Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
226 - 250 of 539 Matches Previous Page  | Next Page
Top Reasons to Deploy a Storage Hypervisor
sponsored by IBM
WHITE PAPER: Check out this 2-page white paper to explore how new state-of-the-art hypervisors can help your organization seamlessly deploy storage virtualization.
Posted: 16 Jul 2012 | Published: 31 Dec 2011

IBM

Cyber Risk Perceptions: An Industry Snapshot
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concerns about cyber-risks in business have increased over the past 12 months, this snapshot survey from Marsh and Chubb reveals.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

ComputerWeekly.com

Five Areas of Records and Information Management Best Practices
sponsored by Iron Mountain
WHITE PAPER: More than 73% of CIOs, general counsel and records managers surveyed in a recent compliance benchmark study indicated they do not proactively monitor their records program for compliance. Out of 4,000 respondents, 42% have no formal information security program and 61% struggle with discovery. Where does your company’s policy fall?
Posted: 21 Jun 2012 | Published: 20 Jun 2012

Iron Mountain

Unified Records Management: Transform Improvement Intent into Reality
sponsored by Iron Mountain
WHITE PAPER: A recent survey showed that 72% of companies lack a strategic information management plan. Discover the advantages of a unified records management program, how to begin crafting your own, and more.
Posted: 21 Jun 2012 | Published: 20 Jun 2012

Iron Mountain

Convenient, Compliant, and Cost-effective Information Destruction
sponsored by Iron Mountain
WHITE PAPER: 56% of organizations’ sensitive or confidential information is still contained on paper documents. Discover the advantages of adding a secure shredding strategy to your information destruction program and gain the peace of mind that your company’s information is safe, even after it’s been destroyed.
Posted: 14 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

How Information Management 2.0 Could Impact Your Business
sponsored by Iron Mountain
WHITE PAPER: Have you heard of information management 2.0? Do you know how it affects cost and risk concerns associated with traditional information management best practices? Uncover tips and tricks for driving down the costs and risks in the era of new communication and collaboration technologies.
Posted: 14 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Managing Integrated Communications, Consumerization and Security: Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the necessity of integrated communications and how they are changing the collaboration and productivity of many organizations. View now for best practices to tackling the challenges you are likely to face and to meeting the needs of integrated communications – for both your organization AND your end-users.
Posted: 13 Jun 2012 | Published: 13 Jun 2012

SearchSecurity.com

Safeguard your organization from Red Flags Rule non compliance
sponsored by Iron Mountain
WHITE PAPER: Since the Red Flags Rule took effect in 2011, there has been a lot of confusion over which businesses must comply and develop identity theft prevention programs. Is your business covered? This paper clearly defines which businesses are affected, explains the key aspects of the Red Flags Rule and more.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

The Cloud Risk Framework
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

ComputerWeekly.com

Information Governance: Business Imperative or Technology Asset?
sponsored by Iron Mountain
EBRIEF: In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals.
Posted: 23 May 2012 | Published: 01 May 2012

Iron Mountain

Research Report: Understand the True Cost of Data Encryption - Like Never Before
sponsored by WinMagic
RESEARCH CONTENT: World renowned Dr. Larry Ponemon, chairman of the Ponemon Institute presents the ground-breaking results of this revolutionary study on the True Cost of Data Encryption. Read this research report to learn how organisations around the world can lower the total cost of IT ownership while protecting their devices - with WinMagic data encryption.
Posted: 16 Aug 2012 | Published: 16 Aug 2012

WinMagic

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Cloud Encryption Gateway: Overcoming Cloud Security and Compliance Concerns
sponsored by CipherCloud
WHITE PAPER: Learn how CipherCloud protects data in Salesforce, Gmail, and Office 365. Find out how the solution sits between your users and your cloud applications and applies AES-256 encryption on the fly before sensitive data leaves the enterprise to provide protection without requiring changes to the cloud application or impacting application functionality.
Posted: 09 Aug 2012 | Published: 09 Aug 2012

CipherCloud

Best Practices in Securing Your Customer Data in Salesforce, Force.com, and Chatter
sponsored by CipherCloud
WHITE PAPER: Many organizations want to move to the Salesforce platform, but concerns about data security, privacy, residency, and compliance have held them back. This whitepaper outlines best practices in securing sensitive customer data in Salesforce and outlines "must have" capabilities to overcome emerging cloud threats.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

CipherCloud

Provisioning Should Be Simple Why Traditional Provisioning Systems Are No Longer Relevant
sponsored by Aveksa
PRESENTATION TRANSCRIPT: Do you want to improve your provisioning system? In the past provisioning has been expensive and ineffective, but that can all improve with a few changes. Deciding who has access to your business enterprise is one of the first steps to take towards improvement.
Posted: 24 Jul 2012 | Published: 23 Jul 2012

Aveksa

Protect citizen data with IBM Rational software
sponsored by IBM
WHITE PAPER: Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

IBM

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012


Cisco Prime LAN Management Solution (WINDOWS OS) 4.2
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: Download your free trial of Cisco Prime LAN Management Solution, an integrated suite of management functions to help you simplify the configuration, administration, monitoring, and troubleshooting of networks and technologies.
Posted: 05 Jul 2012 | Premiered: 15 Feb 2012

Cisco Systems, Inc.

Cisco Prime LAN Management Solution 4.2. Virtual Appliance
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: Download your free trial of Cisco Prime LAN Management Solution for Virtual Appliance, an integrated suite of management functions to improve the configuration, administration, monitoring, and troubleshooting of your network.
Posted: 02 Jul 2012 | Premiered: 15 Feb 2012

Cisco Systems, Inc.

The Federal Mandate for Data Center Consolidation
sponsored by NetApp
WHITE PAPER: Learn about federal data center consolidation requirements and consolidation and cloud computing solutions designed to streamline IT infrastructure and deliver cost, energy and performance benefits.
Posted: 28 Jun 2012 | Published: 01 Feb 2012

NetApp

4 issues caused by retaining too much unnecessary data
sponsored by DLT Solutions
EGUIDE: Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

DLT Solutions

Presentation Transcript: Enabling Analytics in SAP Systems with Microsoft BI
sponsored by Microsoft
PRESENTATION TRANSCRIPT: View this presentation transcript to learn how to integrate your collaborative Microsoft environment with your SAP systems to create streamlined business intelligence (BI) and analytics, business process management (BPM), and enterprise content management (ECM) and data governance and compliance functions.
Posted: 08 Jun 2012 | Published: 08 Jun 2012

Microsoft

Compliance strategies for greater cyber security policies
sponsored by HP Enterprise Security
EGUIDE: Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
Posted: 05 Jun 2012 | Published: 01 Jun 2012

HP Enterprise Security

E-Guide: Physicians Becoming Savvy in EHR Selection
sponsored by Dell, Inc.
EGUIDE: This E-Guide from SearchHealthIT.com highlights the results of a recent American Academy of Family Physicians (AAFP) survey indicating that today's physicians are not only more accepting of EHR adoption, but are becoming increasingly savvy players in EHR decision-making.
Posted: 31 May 2012 | Published: 31 May 2012

Dell, Inc.
226 - 250 of 539 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement