Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
226 - 250 of 522 Matches Previous Page  | Next Page
How Information Management 2.0 Could Impact Your Business
sponsored by Iron Mountain
WHITE PAPER: Have you heard of information management 2.0? Do you know how it affects cost and risk concerns associated with traditional information management best practices? Uncover tips and tricks for driving down the costs and risks in the era of new communication and collaboration technologies.
Posted: 14 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Safeguard your organization from Red Flags Rule non compliance
sponsored by Iron Mountain
WHITE PAPER: Since the Red Flags Rule took effect in 2011, there has been a lot of confusion over which businesses must comply and develop identity theft prevention programs. Is your business covered? This paper clearly defines which businesses are affected, explains the key aspects of the Red Flags Rule and more.
Posted: 13 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

The Cloud Risk Framework
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

ComputerWeekly.com

Information Governance: Business Imperative or Technology Asset?
sponsored by Iron Mountain
EBRIEF: In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals.
Posted: 23 May 2012 | Published: 01 May 2012

Iron Mountain

Records Management: The Keys to Success
sponsored by Iron Mountain
EBOOK: With the heightened compliance regulations, your records management has never been more important. Read this e-book to discover: the importance of physical and digital records convergence, why data retention is a cross-departmental concern, new apps designed specifically for e-discovery, and the compliance risks associated with social media.
Posted: 17 Apr 2012 | Published: 17 Apr 2012

Iron Mountain

Video: Incorporate SIM tools to stay compliant
sponsored by HP Enterprise Security
VIDEOCAST: This resource outlines potential benefits of SIM and log analysis such as improvements in access control, data leak prevention and much more.
Posted: 10 Apr 2012 | Premiered: Apr 9, 2012

HP Enterprise Security

Rethinking records management: A key opportunity for cost-savings
sponsored by Iron Mountain
WHITE PAPER: Delve inside this paper to find five proven techniques for reducing your records management costs while still delivering the capabilities your company needs.
Posted: 02 Apr 2012 | Published: 13 Mar 2012

Iron Mountain

eGuide: Receiving money from the EHR Incentive Program
sponsored by Iron Mountain
EGUIDE: This e-guide discusses two factors that can help hospitals reap the incentives laid out by meaningful use criteria, as well as the “must do” steps required for complying with the incentive program.
Posted: 28 Mar 2012 | Published: 28 Mar 2012

Iron Mountain

Presentation Transcript: Enabling Analytics in SAP Systems with Microsoft BI
sponsored by Microsoft
PRESENTATION TRANSCRIPT: View this presentation transcript to learn how to integrate your collaborative Microsoft environment with your SAP systems to create streamlined business intelligence (BI) and analytics, business process management (BPM), and enterprise content management (ECM) and data governance and compliance functions.
Posted: 08 Jun 2012 | Published: 08 Jun 2012

Microsoft

Compliance strategies for greater cyber security policies
sponsored by HP Enterprise Security
EGUIDE: Access this expert e-guide to learn compliance strategies for greater cyber security policies. Find out why the best security strategy is a solid, prevention-focused internal security policy, how crafting your audit kit before compiling compliance procedures leads to more passed audits, and more.
Posted: 05 Jun 2012 | Published: 01 Jun 2012

HP Enterprise Security

E-Guide: Physicians Becoming Savvy in EHR Selection
sponsored by Dell, Inc.
EGUIDE: This E-Guide from SearchHealthIT.com highlights the results of a recent American Academy of Family Physicians (AAFP) survey indicating that today's physicians are not only more accepting of EHR adoption, but are becoming increasingly savvy players in EHR decision-making.
Posted: 31 May 2012 | Published: 31 May 2012

Dell, Inc.

Risk Management: Safeguarding Against a World of Threats
sponsored by HP Enterprise Security
EBOOK: Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.
Posted: 17 May 2012 | Published: 01 May 2012

HP Enterprise Security

WAN Security: Making the Right Choices for an Optimized WAN
sponsored by XO Communications
WEBCAST: This webinar discusses the recent trends in WAN security, new and upcoming threats, and best practices for making well-informed WAN security decisions for your enterprise.
Posted: 03 May 2012 | Premiered: Apr 30, 2012

XO Communications

E-Guide: Prioritizing Application Security Concerns
sponsored by Coverity
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

Coverity

Enabling Continuous PCI DSS Compliance
sponsored by RedSeal Networks
WHITE PAPER: This white paper highlights a proactive security intelligence solution that ensures continuous implementation of the PCI DSS network security requirements and more effective communication of risk to auditors.
Posted: 01 May 2012 | Published: 01 May 2012

RedSeal Networks

Energy Intelligence Driving Optimization with Visibility
sponsored by SAP America, Inc.
WHITE PAPER: Aberdeen research report on how best in class companies utilize and leverage energy management technology while outpeforming their peers.
Posted: 23 Apr 2012 | Published: 31 Jul 2011

SAP America, Inc.

Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks
sponsored by OpenText
WHITE PAPER: This white paper explores the potential compliance related benefits to adopting fax server technology.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

OpenText

Comparing health care data security compliance to other industries
sponsored by Hewlett-Packard Company
EGUIDE: This e-guide discusses the challenges health care companies run into meeting state and federal data security compliance regulations and how health care organizations compare to other industries such as financial services.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Hewlett-Packard Company

Best and Worst Practices for Exchange email archiving
sponsored by Metalogix
EGUIDE: In this expert e-guide, discover the best and worst practices for email archiving, and review an essential checklist for ensuring that Exchange archives remain compliant.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

Metalogix

HPC Storage: Taming the Data Torrent
sponsored by Dell, Inc. and Intel®
EZINE: Check out this latest issue of HPC source to learn about the current state of high performance computing and what top experts predict for the coming decade.
Posted: 30 Mar 2012 | Published: 01 Aug 2011

Dell, Inc. and Intel®

Presentation Transcript: Balancing compliance with security
sponsored by HP Enterprise Security
PRESENTATION TRANSCRIPT: This presentation transcript explores exactly what it means to be secure and compliant, as well as how security information management (SIM) can assist organizations in achieving both.
Posted: 30 Mar 2012 | Published: 20 Mar 2012

HP Enterprise Security

Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE: This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

HP Enterprise Security

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA, The Security Division of EMC

The Role of Governance, Risk Management & Compliance in Organizations
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Meeting enterprise Governance, Risk and Compliance (eGRC) objective is very challenging in today’s IT world. This white paper outlines the results of a study that surveyed 190 individuals from one of the largest eGRC practitioner communities.
Posted: 27 Mar 2012 | Published: 02 May 2011

RSA, The Security Division of EMC
226 - 250 of 522 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement