Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
51 - 75 of 598 Matches Previous Page  |  Next Page
Case Study: Simplifying Social Media Compliance
sponsored by Smarsh
CASE STUDY: In this white paper, learn how Securities America was able to avoid potential compliance issues with adopting social media using a cloud-based compliance and archiving platform.
Posted: 02 Oct 2015 | Published: 31 Dec 2014


Forrester Market Overview: Social Media Archiving
sponsored by Smarsh
WHITE PAPER: This report by Forrester highlights the key differentiating features of social archiving vendors that are important for risk and compliance professionals to understand. Access now and uncover what it takes to archive social media properly and in a way that delivers the greatest benefit to the business.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Bringing E-Discovery In-House: Risks and Rewards
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper provides a straightforward, pragmatic overview about how legal professionals and organizations confronted with eDiscovery must be able to interpret it within the context of processes, risks, and viable strategies.
Posted: 29 Sep 2015 | Published: 30 Dec 2011

Zylab International, Inc.

End-to-End Defensible eDiscovery
sponsored by Zylab International, Inc.
WHITE PAPER: In this white paper, learn how you can condense eDiscovery processing to avoid data loss and legal consequences.
Posted: 29 Sep 2015 | Published: 05 Aug 2015

Zylab International, Inc.

Handelsbanken Accelerates Insight into Big Data to Mitigate Risk and Support Regulatory Compliance
sponsored by IBM
VIDEO: This webcasts puts the spotlight on one of the top 10 most profitable banks in the world. Tune in and learn how Handelsbanken enabled its data analysts to produce risk data on a daily basis with the speed and simplicity they needed to meet regulatory requirements.
Posted: 25 Sep 2015 | Premiered: 25 Sep 2015


Continuous Compliance: Moving Beyond a Checklist Mentality
sponsored by Unisys
WHITE PAPER: Access this white paper to learn 5 steps to continuously monitor activities to protect your data and ensure ESF or RSF compliance.
Posted: 25 Sep 2015 | Published: 14 May 2015


Case Study: Mobilizing the Business with a Single View of Location
sponsored by Esri
CASE STUDY: Find out how a top energy company overcame their uncertainty over which address and location records were correct. Read on and learn how a geographic information system (GIS) can help you streamline a more accurate, compliant workflow.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


How a Vendor-Neutral Archive Can Support You Through Stage 2 Meaningful Use and Beyond
sponsored by Hitachi Data Systems
WHITE PAPER: Access this white paper to examine the details of two specific measures in the Stage 2 Meaningful Use requirements that address image enabling EHR, compliance strategies, and more.
Posted: 23 Sep 2015 | Published: 30 Apr 2015

Hitachi Data Systems

Enterprise-class security and PCI compliance services partner with eWAY
sponsored by Datapipe
CASE STUDY: In the following case study, learn how eWay was able to reach PCI compliance with the help of Datapipe's PCI compliance solution.
Posted: 22 Sep 2015 | Published: 22 Sep 2015


The Next Stage in Creating the Value-Added Finance Function
sponsored by SAP
WHITE PAPER: In the fall of 2014, CFO Research conducted a survey among senior finance executives at large companies to explore developments in the ways that finance functions employ advanced information capabilities to support business operations. This resource details the full findings of this survey.
Posted: 18 Sep 2015 | Published: 31 Oct 2014


Infographic: Understanding the Retail Data Breach
sponsored by Earthlink.
RESOURCE: In this infographic, you'll learn the 7-point anatomy of a retail data breach and how hackers find their success. By learning their plan, you'll be able to create an actionable and compliant security strategy to protect organizational and customer data.
Posted: 18 Sep 2015 | Published: 31 Dec 2014


A Modern Disaster Recovery Approach Fit for US Government Security Standards
sponsored by NTT America, Inc.
CASE STUDY: In this business impact summary, find out how one government organization formed a flexible, fast, and cloud-based disaster recovery strategy that held up under strict regulations.
Posted: 17 Sep 2015 | Published: 30 Apr 2015

NTT America, Inc.

Strategies for Driving the Utilization of Speech Recognition in Healthcare
sponsored by Aventura
WHITE PAPER: Access this white paper to discover the benefits of speech recognition in healthcare - as well as the challenges these applications present and how to overcome them.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


The Economist – Holistic Risk Management
sponsored by SAP
WHITE PAPER: Examine a holistic and strategic risk management approach to help your organization identify, audit, and address strategic risks.
Posted: 16 Sep 2015 | Published: 02 Sep 2015


Report: What you Need to Build High-Performing Finance Functions
sponsored by SAP
WHITE PAPER: In this report, discover startling statistics from CFO researchers that detail the drive to transform finance operations. As you read, learn what you can do to optimize business process execution, cash management, and your bottom line.
Posted: 15 Sep 2015 | Published: 31 Dec 2015


PCI DSS: Stronger Security for Cryptographic Keys and Digital Certificates
sponsored by Venafi
WHITE PAPER: This white paper explains the new PCI DSS requirements and gives advice for meeting them.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Industry Shifts Focus to Health IT Interoperability
sponsored by Aventura
EGUIDE: Explore highlights of the Shared Nationwide Interoperability Roadmap issued by the ONC this year. Learn how to achieve nationwide health IT interoperability, and get an expert's take on which barriers will be faced on this journey.
Posted: 14 Sep 2015 | Published: 14 Sep 2015


CW Buyer's Guide: SaaS Management
sponsored by
EZINE: Computer Weekly looks at how organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance; the number of compliance issues that come with SaaS; and how CIOs believe SaaS providers must better meet their needs in terms of simplicity and flexibility.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Developing a Single Sign-on Implementation Plan for Healthcare Organizations
sponsored by Aventura
EGUIDE: Discover how to develop a single sign-on (SSO) implementation plan for healthcare to boost medical record accuracy, as well as meaningful use compliance.
Posted: 11 Sep 2015 | Published: 11 Sep 2015


Do You Trust Your Cloud?
sponsored by Intel and IBM
WEBCAST: This brief video examines how to gain control and transparency over your cloud infrastructure to minimize data loss and breaches. View now to learn how to remain compliant and maintain an auditable trail.
Posted: 09 Sep 2015 | Premiered: Aug 5, 2015

Intel and IBM

The Critical Need for Enterprise-Grade File Sync and Share
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper introduces methodologies for mitigating risks associated with consumer-focused file sync and share (CFSS) and lowering the costs of managing corporate information. Learn how enterprise-grade file sync and sharing (EFSS) will enable continued efficiency for users, while putting IT back in charge of corporate content.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IntraLinks, Inc

Case Study: Streamline Workflow, Enhance Documentation Quality & Efficiency
sponsored by Aventura
WHITE PAPER: This case study demonstrates how one hospital was able to boost patient record accuracy and productivity, and save time for clinicians with a new virtual desktop strategy.
Posted: 27 Aug 2015 | Published: 27 Aug 2015


Urgency Grows for Automated Archiving Capabilities
sponsored by Commvault
WHITE PAPER: This white paper outlines the importance for automated archiving, and how it can help reduce the resources used to manage data. Read on to learn about what options organizations are considering for archiving, and why archiving should be incorporated into a comprehensive, enterprise-wide information management framework.
Posted: 19 Aug 2015 | Published: 19 Aug 2015


Maintaining a Dynamic Security Posture in a Chaotic Threat Environment
sponsored by
VIRTUAL SEMINAR: This virtual environment brings six informative webcasts into one convenient spot, helping you to adapt your security posture to today's chaotic threat environment.
Posted: 05 Aug 2015 | Premiered: 28 Jul 2015

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER: Follow the evolution of HIPAA-HITECH regulations over the past few years, learn why compliance is more important than ever before, and gain knowledge on how to avoid violations inside this resource.
Posted: 04 Aug 2015 | Published: 15 Jul 2015

51 - 75 of 598 Matches Previous Page    1 2 3 4 5 6    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement