Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
26 - 50 of 579 Matches Previous Page  |  Next Page
Critical Security and Compliance Considerations for Hybrid Cloud Deployments
sponsored by Hewlett Packard Enterprise
ANALYST REPORT: Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.
Posted: 27 Sep 2016 | Published: 31 Jul 2016

Hewlett Packard Enterprise

Companies, Digital Transformation and Information Privacy: The Next Steps
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Hewlett Packard Enterprise

The General Data Protection Regulation Challenge
sponsored by Close Brothers Technology Services
WHITE PAPER: This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.
Posted: 21 Sep 2016 | Published: 30 Jun 2016

Close Brothers Technology Services

Public Key Infrastructure: The New Best Practices
sponsored by Certified Security Solutions (CSS)
WHITE PAPER: This white paper outlines how Public Key Infrastructure (PKI) has evolved and highlights some common PKI weaknesses of today. Access now to uncover best practices on how to identify challenges, address questions, and manage issues to reduce risk and meet audit and compliance requirements for PKI operations.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Certified Security Solutions (CSS)

PACS Infrastructure in the Cloud: Addressing Security, Compliance, and TCO
sponsored by Ambra
EBOOK: Discover how to properly prevent the catastrophic loss of images, and optimize healthcare systems storage capacity, by deploying cloud-based archiving for the PACS infrastructure. Read on to create a highly agile environment for sharing and receiving medical data, and secure all expanding images on-demand.
Posted: 16 Sep 2016 | Published: 16 Sep 2016


Data Access Governance Buyer's Guide Selecting the Right Solution to Protect Unstructured and Sensitive Data
sponsored by STEALTHbits
RESOURCE: This buyer's guide will help choose the best available Data Access Governance solution. The information contained within can be used in creating a request for information (RFI) or request for proposal (RFP) and evaluating Data Access Governance products.
Posted: 13 Sep 2016 | Published: 31 Dec 2015


Build a Data Access Governance Program to Control Unstructured Data
sponsored by STEALTHbits
WHITE PAPER: Following this 5 step plan will help ensure your organization has its data secured. By the end, you will know how to survey all your organization's data, focus attention where it matters most, get the right stakeholders involved, review and remediate access, and arrive at a working security model to meet both security and compliance needs.
Posted: 09 Sep 2016 | Published: 31 Dec 2015


The Hidden Cost of Compliance
sponsored by Imperva
RESOURCE: Learn how to cut back on these hidden costs through this short infographic. See statistics on a proven solution that will eliminate built-in auditing tools costing you millions and make auditing easier overall.
Posted: 08 Sep 2016 | Published: 08 Sep 2016


Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016


Secure Content Collaboration Across All Devices
sponsored by Citrix
RESOURCE: This resource explores how you can create custom workflows that automate feedback and approval processes as well as allow you to work with the confidence that your files are secure on any device. Find out how you can protect sensitive documents, streamline document approvals and feedback, and increase your organization's flexibility.
Posted: 02 Sep 2016 | Published: 02 Sep 2016


Cloud Services Take Off, GRC Doesn't
sponsored by
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Magic Quadrant for Security Information and Event Management
sponsored by IBM
RESEARCH CONTENT: The need for early targeted attack detection and response is driving the expansion of new and existing security information and event management deployments. This report by Gartner examines and compares the top vendors who market and sell SIEM products. Find out the strengths and weaknesses of each vendor so that you can better navigate the market.
Posted: 29 Aug 2016 | Published: 10 Aug 2016


Removing the Risk from Compliance in the Cloud
sponsored by VMware
WHITE PAPER: Learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Discover how to ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.
Posted: 19 Aug 2016 | Published: 01 Jul 2016


Compliance - The New Hot Button for CIOs
sponsored by VMware
WHITE PAPER: This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.
Posted: 16 Aug 2016 | Published: 01 Jan 2016


Expense Management: Flexible Systems for More Efficiency and Compliance Capabilities
sponsored by Infor
VIDEO: This video explores how Raymond James Financial implemented expense management, enabled flexibility, and enhanced compliance capabilities. Find out how they improved reporting, sped up turnaround on payment and expense reports, eliminated manual routing and exception reporting, and more.
Posted: 12 Aug 2016 | Premiered: 12 Aug 2016


Cyber Security Awareness with PolicyTech
sponsored by Navex Global
VIDEO: Learn how to save time and money in training employees while ensuring your organization meets legal and regulatory requirements. Access now to discover more about why distributing your security policy has never been easier.
Posted: 29 Jul 2016 | Premiered: 01 Jun 2016

Navex Global

Fundamental Review of the Trading Book Standardised Model Approach From SAS®
sponsored by SAS
WHITE PAPER: The new standardized model from The Fundamental Review of the Trading Book (FRTB) will have a massive impact on all financial institutions, and is already creating compliance challenges. Uncover an innovative, cost-effective route to improving data quality and gaining regulatory compliance. Discover the technology that will simplify implementation.
Posted: 22 Jul 2016 | Published: 22 Jul 2016


Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.

Oracle Compliance: Challenges and Solutions
sponsored by Matrix42
WEBCAST: This question-and-answer video features advice for complying with Oracle database licensing challenges that are becoming more common. Find out the best way to get relevant information from your Oracle instances to properly prepare for audits.
Posted: 14 Jul 2016 | Premiered: Jul 14, 2016


4 Cybersecurity Trends that Might Be Affecting Your Organization
sponsored by Navex Global
ANALYST REPORT: In this blog post, you'll learn 4 top cybersecurity trends that could be affecting your organization. Discover which attacks to look out for in the near future, and learn how businesses have come to rely on compliance programs to ensure that their organizations operate properly.
Posted: 13 Jul 2016 | Published: 04 May 2016

Navex Global

Smarter Commerce Spells Sweet Success for Gourmet Baker
sponsored by VAI, Vormittag Associates, Inc.
WHITE PAPER: Read this "Food Logistics" article to find out how, with the help of an IT vendor, a gourmet bakery called Love & Quiches overcame poorly integrated applications and the limitations of spreadsheets for record management. Learn how the ERP system Love & Quiches adopted afforded them compliance efficiencies, improved forecasting, and more.
Posted: 08 Jul 2016 | Published: 31 Dec 2015

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016


4 Steps to Effectively Managing Risk and Compliance for Financial Services
sponsored by IBM
WHITE PAPER: Learn why convergence is key to maximizing governance efforts, and discover the 4 steps financial services organizations can take to mitigate compliance risks.
Posted: 22 Jul 2016 | Published: 31 May 2011

26 - 50 of 579 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement