Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
51 - 75 of 593 Matches Previous Page  |  Next Page
Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance
sponsored by TrendMicro
WHITE PAPER: In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.
Posted: 24 May 2016 | Published: 31 Oct 2015

TrendMicro

The Productivity Transformation
sponsored by IBM MaaS360
WHITE PAPER: Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.
Posted: 19 May 2016 | Published: 01 Mar 2016

IBM MaaS360

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements
sponsored by Citrix
RESOURCE: To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.
Posted: 16 May 2016 | Published: 12 May 2015

Citrix

Overcoming 4 Key Challenges of Data Privacy
sponsored by Iron Mountain
WHITE PAPER: Data privacy must be protected on a continuous basis far beyond the requirements of passing compliance audits. Learn the 4 key challenges of data privacy and how to overcome them.
Posted: 13 May 2016 | Published: 01 Apr 2016

Iron Mountain

Blue Skies Ahead? The State of Cloud Adoption
sponsored by Intel Security
WHITE PAPER: IT needs greater visibility to achieve better trust in cloud security. This comprehensive report reveals the results of a survey conducted with 1,200 IT decision-makers across 8 different countries about the security challenges they've faced with cloud adoption.
Posted: 06 May 2016 | Published: 06 May 2016

Intel Security

4 Ways Data Loss Prevention Can Help Meet More Stringent HIPAA Enforcement
sponsored by Digital Guardian
WHITE PAPER: Implemented correctly, data loss prevention (DLP) can help your organization maintain HIPAA compliance. This white paper reviews 4 specific HIPAA statutes and how DLP helps your organization comply with each.
Posted: 04 May 2016 | Published: 01 Apr 2016

Digital Guardian

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

How to Evaluate Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

Enable Mobile Users and Stay Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Case Study: Data Management Fulfills Healthcare Compliance Requirements
sponsored by Commvault
VIDEO: Salem Health's Tim Woodland discusses how they switched to a data management solution that met their non-negotiable need for compliance. Uncover the 3 main benefits they gained, and how these improvements saved them money on data management.
Posted: 21 Apr 2016 | Premiered: 21 Apr 2016

Commvault

Drawing business value from GRC analytics
sponsored by SearchCompliance.com
EBOOK: In this handbook, learn how companies are drawing business value from GRC analytics data and developing strategies to incorporate analytics best practices that benefit company-wide business processes.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

SearchCompliance.com

The CIO's Guide to Mainframes: Evaluating Sourcing Strategies to Mitigate Risk
sponsored by Windsor Group
WHITE PAPER: Discover in this guide how to formulate a sourcing strategy for your mainframe, starting with a baseline to identify how your decisions will affect staff, budgets, compliance, and cost, and align your outcome to current needs and future direction.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

Windsor Group

The Impact of the New FRCP Amendments on Your Business
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, revisit the changes to the Federal Rules of Civil Procedure and what the implications are for your organization's email storage and compliance policies.
Posted: 15 Apr 2016 | Published: 31 Jan 2007

ArcMail Technology

Three Rules for Managing Email Compliance
sponsored by ArcMail Technology
WHITE PAPER: Discover 3 email security and ECM rules that can help your organization meet email compliance standards and keep your rising amounts of data coming through a variety of sources protected.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Email Archiving vs. Destructive Retention Policies
sponsored by ArcMail Technology
WHITE PAPER: In this white paper, learn how to overcome challenges related to email storage and security. Discover the limitations of destructive retention policies, and how archiving is surpassing it as a method to secure your information, provide compliance, and improve discovery and productivity.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

ArcMail Technology

Email Compliance Rules for Government and Education
sponsored by ArcMail Technology
WHITE PAPER: Get an in-depth look at how to ensure compliance for email within government and education sectors. Explore how compliant you are by leveraging a self-assessment, discover the legal hurdles you have to be aware of to deal with compliance effectively, and more.
Posted: 12 Apr 2016 | Published: 31 Dec 2011

ArcMail Technology

How HealthEast Care System Achieved EPCS Success
sponsored by Imprivata
VIDEO: In this short video, hear from key IT and clinical decision makers at HealthEast Care System as they describe how they achieved an efficient way to safely and securely electronically prescribe controlled substances.
Posted: 25 Mar 2016 | Premiered: 29 Feb 2016

Imprivata

Case Study: Protect Against Prescription Fraud with EPCS
sponsored by Imprivata
WHITE PAPER: The case study outlines Cambridge Health Alliance's drivers for implementing electronic prescribing of controlled substances (EPCS), and strategies and technologies for meeting DEA requirements. Gather best practice advice to help your healthcare organization achieve EPCS success.
Posted: 22 Mar 2016 | Published: 31 Dec 2015

Imprivata

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

IBM

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper provides business planners with informative details on how to maintain strong security and PCI DSS compliance in a distributed retail environment. Access now for tools on how to keep applications, data and networks safe and PCI DSS compliant.
Posted: 15 Apr 2016 | Published: 01 Jan 2014

WatchGuard Technologies, Inc.

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.
Posted: 14 Apr 2016 | Published: 31 Dec 2013

IBM

How to Keep Cloud Services Compliant with HIPAA Standards
sponsored by Actiance
EGUIDE: In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Actiance
51 - 75 of 593 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement