Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
26 - 50 of 556 Matches Previous Page  |  Next Page
The Security Balancing Act
sponsored by RES Software
RESOURCE: Learn the risks associated with mobile users and how to best protect your valuable data. Uncover best practices for securing your digital workforce and utilize a people-centric approach to managing security, governance, and identity and access management.
Posted: 17 Nov 2016 | Published: 30 Sep 2016

RES Software

Maintaining Compliance for the Cloud Generation
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn what regulations govern compliance in the cloud how to maintain them. Access this white paper now to discover the liability companies have from using various cloud apps, what industries are most affected by cloud compliance issues, how to ensure cloud vendors conform to compliance guidelines, and more.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

Symantec & Blue Coat Systems

Remove the Security Blind Spots Created by Encrypted Traffic
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how to get the visibility and control you need over encrypted traffic to ensure compliance with privacy and regulatory policies. Enable your organization to cost-effectively eliminate blind spots within your environment and maximize the effectiveness of your security infrastructure investments overall.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

New EU Security Requirements and You
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover new EU security requirements and learn what you can do to get ready. Create a holistic approach to data protection and infrastructure security to best avoid compliance risk.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

Meet New Banking Regulations Without Losing Profitability With Liquidity Optimization
sponsored by SAS
WHITE PAPER: In this white paper, discover software that can help you comply to new banking regulations without compromising your profitability. This program offers a single data model for managing liquidity risk, optimization capabilities, a risk engine to help you prepare for multiple scenarios, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

A Path to Good Risk Taking Through Data Analytics
sponsored by SAS
WHITE PAPER: This white paper explores the strategic benefit of making analytics an integral part of your risk management plan. Inside, learn 11 principles for enhancing risk management and the way banks are currently leveraging analytics for risk assessment. You'll also find some risk management success stories.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

Cb Defense: PCI DSS Anti-Virus Assessment
sponsored by Carbon Black
WHITE PAPER: This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Carbon Black

Holistic Data Protection Center: Reduce Your Costs and Downtime
sponsored by Commvault
VIDEO: Access this video case study to learn how Salem Health implemented a stronger data protection strategy to minimize downtime, accelerate recovery, reduce costs, and achieve compliance with ease.
Posted: 31 Oct 2016 | Premiered: 31 Oct 2016

Commvault

Achieve Both Compliance and Innovation
sponsored by Chef Software
WHITE PAPER: Discover how it's possible to achieve both compliance and innovation. Learn how compliance can become simply another step on the assembly line and the idea of infrastructure as code, which allows your enterprise to specify its compliance-related requirements in ways that can be automatically tested.
Posted: 21 Oct 2016 | Published: 01 Jun 2016

Chef Software

Log Management and Automation for NIST Cyber Security Framework
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.
Posted: 07 Oct 2016 | Published: 30 Nov 2014

LogRhythm, Inc.

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

PACS Infrastructure in the Cloud: Addressing Security, Compliance, and TCO
sponsored by Ambra
EBOOK: Discover how to properly prevent the catastrophic loss of images, and optimize healthcare systems storage capacity, by deploying cloud-based archiving for the PACS infrastructure. Read on to create a highly agile environment for sharing and receiving medical data, and secure all expanding images on-demand.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Ambra

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: How do you ensure security in Office 365? Discover how to layer smart security to detect and block attacks and automate response to quickly remove threats before than can do harm. With a little planning, you'll soon be able to stop 99.9% of advanced threats before they reach your users.
Posted: 07 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Evolution of Regulatory Capital Planning, Measurement, and Management
sponsored by SAS
WHITE PAPER: A key drawback of the Basel framework is its focus on historical capital adequacy, which does not help assess the impact of stress events on banks. Learn about how banks need an appropriate system to combine compliance with these risk-based capital adequacy regulations.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

SAS

Cloud Services Take Off, GRC Doesn't
sponsored by SearchSecurity.com
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

SearchSecurity.com

Removing the Risk from Compliance in the Cloud
sponsored by VMware
WHITE PAPER: Learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Discover how to ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

VMware

Compliance - The New Hot Button for CIOs
sponsored by VMware
WHITE PAPER: This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.
Posted: 16 Aug 2016 | Published: 01 Jan 2016

VMware

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

Transforming Finance Processes for the Digital Economy
sponsored by SAP
WHITE PAPER: Finance is at the heart of the digital business, but the financial processes and technology platforms that have been utilized in the last 20 years aren't agile enough for the digital economy. Access this white paper to explore a modern approach to managing critical processes like planning and analysis, risk management, compliance, and more.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

SAP

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

How To Know If Your Organization Is Ready For Data Governance Software
sponsored by Veritas
EGUIDE: It's important to ensure your organization is ready for a governance tool, or your software purchase is likely to fall flat. This e-guide takes a look at three different scenarios where data governance tools are often used to help you determine if your organization is ready for data governance software.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Veritas

Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration
sponsored by Dell Software
EGUIDE: This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE: Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

Dell Software

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion
26 - 50 of 556 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement