Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
26 - 50 of 540 Matches Previous Page  |  Next Page
Overcome Regulatory Data Retention Challenges With Compliance Archiving
sponsored by EMC Corporation
WHITE PAPER: A modern enterprise must be able to retain information for years in order to comply with ever-changing government and industry regulations. Consult the following expert report to learn about a single platform that's has been designed to ensure compliance and ultimately, help with reaching archiving goals during constant flux.
Posted: 19 Dec 2014 | Published: 19 Dec 2014

EMC Corporation

Legacy Decommissioning: Good for the Budget, Good for Compliance
sponsored by EMC Corporation
WHITE PAPER: When it comes to records keeping, migrating and consolidating the important corporate records onto a modern archive system can improve access, lower costs and simplify compliance. Unfortunately, this can get a bit complicated—so, how do you do it? Check out the following white paper to find out now.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

EMC Corporation

Enterprise Mobile Checklist: Reaching Regulatory Compliance
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility for organizations with strict regulatory compliance. Read on to learn more.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

BlackBerry

Risk Assessment Redo: Trends that make you rethink info governance strategy
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: New data protection vulnerabilities have forced organizations to reexamine risk management strategy. In this classroom, learn how to adapt your risk assessment and information management strategies to face modern threats.
Posted: 08 Dec 2014 | Premiered: 05 Dec 2014

SearchCompliance.com

The Relationship Between Identity Management and Compliance
sponsored by ObserveIT
EGUIDE: This expert guide asks whether anomaly-based user activity monitoring is the only way to stop data breaches, and also explains how IAM should and shouldn't be used to support enterprise compliance processes.
Posted: 08 Dec 2014 | Published: 08 Dec 2014

ObserveIT

Identity and Access Management Guidelines
sponsored by ObserveIT
EGUIDE: In this expert guide, Forrester Principal Analyst Andras Cser introduces an effective, easy-to-use maturity model that will enable you to evaluate your enterprise's IAM strategy and infrastructure, and Nilesh Shirke lists a number of best practices for IAM solution implementation.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

ObserveIT

Beckman Coulter Implements Oracle Global Trade Management
sponsored by Oracle Corporation UK Ltd
VIDEO: In this short video, medical device company Beckman Coulter's senior IT manager describes how Oracle Global Trade Management enabled the organization to meet global trade compliance regulations while realizing performance gains and cost savings.
Posted: 03 Dec 2014 | Premiered: 24 Feb 2014

Oracle Corporation UK Ltd

European Regulations That Impact Cloud Usage
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet for 11 crucial privacy and cross-border residency regulations in Europe.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh

Insurance Industry Q&A: Achieving Seamless Workflow
sponsored by Hewlett-Packard Limited
WHITE PAPER: With many of these new facets to take care of, the following Q&A is meant to help insurers understand how to effectively deal with workflow related issues.
Posted: 14 Nov 2014 | Published: 31 May 2013

Hewlett-Packard Limited

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

Matching Information Workflow Solutions to Your Compliance Needs
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exlusive white paper examines a workflow solution that helps organizations stay compliant and reap the benefits of doing so. Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

Hewlett-Packard Limited

Closing Security Gaps in Mobile Applications
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper takes an in-depth look at mobile security.  Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

CA Technologies.

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

New Ways to Simplify Software Management
sponsored by CDW Corporation
VIDEO: In this video, you'll learn how you can deliver everything you need to simplify software management and ensure licensing compliance. View now to learn how CDW can help you ensure compliance and navigate license agreements – even when dealing with multiple vendors – to ensure a more efficient and cost-effective approach.
Posted: 22 Oct 2014 | Premiered: 17 Oct 2014

CDW Corporation

Managing Legal Content in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: For law firms and corporate legal departments, the dynamics of a cloud delivery approach can be attractive. Learn more about how HP Worksite in the Cloud makes this possible.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Hewlett-Packard Company

The SOX Effect
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchCompliance.com

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM
26 - 50 of 540 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement