Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
26 - 50 of 628 Matches Previous Page  |  Next Page
Secure Cloud Infrastructure: Is Private Cloud Data Safe?
sponsored by Oracle Corporation
WHITE PAPER: Explore what security measures are required from a private cloud provider in this white paper. In addition, read on to examine one private cloud platform that can help your organization to meet these security and compliance requirements.
Posted: 06 Nov 2015 | Published: 28 Oct 2015

Oracle Corporation

Network Security and Regulatory Compliance Strategies
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this analyst report to find a four-step approach to focused, disciplined network security and sustaining requirements for regulatory compliance.
Posted: 06 Nov 2015 | Published: 06 Nov 2015

Hewlett Packard Enterprise

Supporting Technologies and Enterprise Scenarios for Deploying DLP Products
sponsored by Oracle Corporation
EGUIDE: In this exclusive e-guide, you will learn how to boost your enterprise security with 5 surprising supporting technologies like MDM and secure file sharing. Read on now to complement your existing DLP products and access 4 enterprise scenarios for deploying database security tools.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Advanced, Efficient, and Trusted Security Practices
sponsored by Unisys
DATA SHEET: In this solution brief, you'll discover ways to address threats with new approaches that give you the security, affordability, and management control you need today. Access now and find answers to your most pertinent security questions.
Posted: 05 Nov 2015 | Published: 30 Sep 2015


Compliance 101: Basics for Security Professionals
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this paper for a basic look at the most important compliance considerations all security professionals must be aware of.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Bit9 + Carbon Black

Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.

CXO Guide to Security and Archiving Challenges with Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the limitations of Office 365's built in security features and how you can augement your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014

Proofpoint, Inc.

Your Journey to Always-On in Four Steps
sponsored by IBM
WHITE PAPER: This white paper provides four time-tested steps that detail how your organization can shift from your legacy disaster recovery solution to an always-on design. Download your copy now for advice on seamlessly making the transition.
Posted: 03 Nov 2015 | Published: 30 Jun 2015


Data Privacy in the Cloud
sponsored by OpenText
WHITE PAPER: This white paper can help you navigate the complexities of international data privacy laws and cloud computing.
Posted: 03 Nov 2015 | Published: 02 Nov 2015


Best Practices for Detecting and Mitigating Advanced Persistent Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, learn expert best practices to detect and mitigate APTs and targeted malware before users fall prey to hacker exploits.
Posted: 30 Oct 2015 | Published: 09 Sep 2015

Proofpoint, Inc.

Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates and HIPAA Standards
sponsored by IBM
WHITE PAPER: Access this guide to get an overview of how enterprises can accelerate the development of B2B integration solutions that facilitate compliance with the US Affordable Care Act (ACA). Also inside learn how data processing can efficiently process data governed by the evolving body of HIPAA data standard and related mandates.
Posted: 29 Oct 2015 | Published: 29 Oct 2015


5 Steps to Implement and Maintain PCI DSS Compliance
sponsored by AlienVault
WHITE PAPER: This white paper outlines the 5 steps to implementing and maintaining PCI DSS compliace in your organization.
Posted: 27 Oct 2015 | Published: 07 Oct 2015


Special Report: The Success of Electronic Communications Compliance
sponsored by Smarsh
WHITE PAPER: In this report, over one hundred compliance professionals were asked how their organizations are approaching communications compliance and what their greatest challenges are.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Shielding Office 365 from Advanced Threats
sponsored by Proofpoint, Inc.
WEBCAST: Office 365 comes with built-in security features, but relying on those alone won't protect your data. In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks.
Posted: 22 Oct 2015 | Premiered: Oct 13, 2015

Proofpoint, Inc.

Investment bank meets complex compliance requirements
sponsored by Blue Coat Systems
CASE STUDY: Today's compliance requirements have been growing and evolving rapidly over the past few years. Access this case study to find out how Jefferies, an independent investment bank, met these complex, fast-changing compliance requirements while empowering users.
Posted: 22 Oct 2015 | Published: 29 Nov 2013

Blue Coat Systems

Gartner Magic Quadrant for Secure Email Gateways 2015
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant report, find out what SEGs top the list as leaders delivering strong email security capabilities. View now to learn the strengths of today's top SEG platforms as well as cautionary advice from insiders.
Posted: 21 Oct 2015 | Published: 29 Jun 2015

Proofpoint, Inc.

The Cybercrime Economics of Malicious Macros
sponsored by Proofpoint, Inc.
RESOURCE: Learn more about how cybercriminals are driving today's massive targeted attack campaigns with ease.
Posted: 20 Oct 2015 | Published: 07 Oct 2015

Proofpoint, Inc.

Aggravation or Aggregation: Risk Data and Compliance
sponsored by SAS
WHITE PAPER: Access this survey now to uncover best practices that your bank may use as a guide in formulating a response to comply with BCBS 239 principles. Read on to learn more.
Posted: 14 Oct 2015 | Published: 31 Dec 2014


Best Practices for Classification Techniques and Data Protection
sponsored by Identity Finder, LLC
WEBCAST: In this webinar, Forrester senior analyst Heidi Shey reveals how to turn your data classification project into a success. Tune in and learn how to protect sensitive data types beyond the realm of what is considered regulated.
Posted: 12 Oct 2015 | Premiered: Jun 24, 2015

Identity Finder, LLC

Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Security and Compliance: The New Watchwords of Enterprise App Delivery
sponsored by IBM
WHITE PAPER: This white paper examines the driving forces behind the establishment of corporate application stores, and highlights one best-in-class mobile app management (MAM) program. Read on to learn how to ride the crest of this new wave of mobility and enhance your enterprise app security.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


How to Select the Right Asset Management Tool
sponsored by Matrix42
WHITE PAPER: This white paper provides expert tips for selecting the right software asset management (SAM) tool to effectively manage your software licenses.
Posted: 09 Oct 2015 | Published: 09 Oct 2015


Navigate The Future Of Identity And Access Management
sponsored by Covisint
WHITE PAPER: In this Forrester Report, discover analysts' revelations about how to support new initiatives in an increasingly competitive business environment with superior security.
Posted: 08 Oct 2015 | Published: 03 Aug 2015

Information Governance: People, Process & Technology
sponsored by DLT & Veritas
WHITE PAPER: This white paper outlines what you need to know about information governance and compliance as it relates to data storage. Read on to learn from industry experts about how backup technology can help reduce legal risks and costs for businesses.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

DLT & Veritas
26 - 50 of 628 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement