Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
26 - 50 of 577 Matches Previous Page  |  Next Page
Ignore Compliance, Focus on Security
sponsored by FireHost Inc.
WHITE PAPER: This white paper explores how enterprises that focus on security first to address an organization's sensitive data will solve compliance requirements along the way. Instead of following a compliance checklist, learn to tackle the 5 risk assessment methodologies to mitigate threats and ensure confidentiality.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

FireHost Inc.

Tips For Securing Cloud-Based ECM And Enterprise Collaboration Tools
sponsored by IntraLinks, Inc
EGUIDE: This e-guide explores how companies can use enterprise collaboration tools to brainstorm ideas in a secure, recordable fashion. Join Forrester's Rob Koplowitz as he explains adoption trends for compliant technological teamwork, and learn the competitive potential of deploying sooner than later.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

IntraLinks, Inc

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014

IBM

Service Optimization Maturity Assessment
sponsored by TeamQuest Corporation
VIDEO: This brief video explains how service optimization maturity models play a key role in gradually refining optimization efforts. Watch and learn how to optimize without compromising your overall service quality or value.
Posted: 23 Jun 2015 | Premiered: 23 Jun 2015

TeamQuest Corporation

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9 + Carbon Black
WEBCAST: This brief whiteboard video presents 9 best practices to securing store systems to comply with PCI standards.
Posted: 18 Jun 2015 | Premiered: Nov 9, 2012

Bit9 + Carbon Black

The Evolution of Data Privacy
sponsored by Symantec Corporation
WHITE PAPER: This white paper assures that optimizing the way you handle data privacy will in turn optimize the way your business responds to customers, partners and employees. The confidence to be able to handle compliance regulations can provide you with assurance in your customer service levels, and more.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015

Commvault

Data as currency: Creating information value in the digital age
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: As enterprises strive to find ways to monetize information, they must balance the impulse to exploit their data with security and privacy concerns. In this classroom, we'll explore how organizations can stay on the right side of the law as they extract value from data.
Posted: 15 Jun 2015 | Premiered: 08 Jun 2015

SearchCompliance.com

Predictive Threat and Risk Management: Meeting the Challenges of a Smarter Planet
sponsored by IBM
WHITE PAPER: No organization can - or should - put up with billions in losses due to poor risk management. This white paper brings to light the digital security made possible by business analytics. Access this resource if you are plagued by virtual surveillance challenges.
Posted: 11 Jun 2015 | Published: 31 Dec 2013

IBM

Managing Threat and Fraud with Predictive Analytics
sponsored by IBM
VIDEO: This brief video encourages a systematic approach to reducing exposure and minimizing negative impact. Start discovering your best defense by analyzing the billions of bits of data in your company.
Posted: 11 Jun 2015 | Premiered: 30 Mar 2015

IBM

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Meeting PCI and ISO Compliance Checklist
sponsored by Melbourne IT
WHITE PAPER: The following white paper provides a checklist for meeting PCI and ISO compliance. Access now and discover what it takes to keep the cyber criminals at bay when it comes to your client's credit card information.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Melbourne IT

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

SearchSecurity.com

Claims Validation with smartC and the Hortonworks Data Platform
sponsored by Hortonworks
RESOURCE: Discover how your organization can prevent insurance fraud with better data management. Access this white paper to learn how you can solve common compliance and insurance challenges.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Hortonworks

Harmonize File Sharing in Your Mac/Windows Environment
sponsored by Acronis
TRIAL SOFTWARE: Start your trial download for a file-and-print sharing tool today and mitigate protocol issues, performance, and compatibility problems. Discover three main benefits for Mac users in a Windows environment.
Posted: 29 May 2015 | Premiered: 29 May 2015

Acronis

Increase Collaboration and Productivity with Nuance Power PDF
sponsored by Nuance
WHITE PAPER: This brief white paper assures that the growing expectations on PDF users can be met. Use this resource to gain awareness of effective PDF strategies that have the power to create a standard, productive, compliant, and cloud-based workflow.
Posted: 29 May 2015 | Published: 29 May 2015

Nuance

Hertz - World leading car rental company usesVMware View to simplify infrastructure andimprove user experience
sponsored by VMware
WHITE PAPER: This white paper explains how VMware can help you simplify your server and desktop environment through virtualization. Read now to find out how Hertz cut costs and improved compliance.
Posted: 28 May 2015 | Published: 28 May 2015

VMware

PDF Collaboration Efforts for Optimizing Workflow
sponsored by Nuance
WHITE PAPER: This white paper explores how to determine which PDF technologies will meet your collaboration workflow needs. You'll know you've formed an effective strategy when you discover 6 key benefits.
Posted: 28 May 2015 | Published: 31 Dec 2014

Nuance

Digitize and Accelerate Workflows with Electronic Stamp, Watermark and Signature Application
sponsored by Nuance
VIDEO: This brief video demonstrates the process of digitally implementing stamps, watermarks and signatures on important files. Tune in and learn which technologies are appropriate for this endeavor.
Posted: 27 May 2015 | Premiered: 02 Apr 2014

Nuance

Achieve Data Governance and Quality With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.
Posted: 27 May 2015 | Published: 27 May 2015

Information Builders

PDF Security in Seconds
sponsored by Nuance
VIDEO: In today's business world, redacting information in sensitive documents can consume valuable time and money. This brief video explores how to make your documents, as well as entire folders, more secure in seconds with agile search capabilities. Tune in now and be well on your way to more compliant collaborations.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

What's Driving Hybrid Cloud Adoption?
sponsored by Peer1
VIDEO: This short video explores the elements driving hybrid cloud adoption.
Posted: 22 May 2015 | Premiered: 22 May 2015

Peer1

Mobile call recording: Are You Complying or Compromising?
sponsored by Smart Numbers
WHITE PAPER: This white paper makes the case for implementing a mobile business call recording solution that will help you defend your organization from public scrutiny.
Posted: 21 May 2015 | Published: 21 May 2015

26 - 50 of 577 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement