Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
51 - 75 of 585 Matches Previous Page  |  Next Page
Case Study: Optimizing CDM and CMaaS Across the Federal Government
sponsored by Splunk
WHITE PAPER: This tech brief features machine data management capabilities that provide the level of visibility required to deliver risk intelligence and reporting. Access now and discover effective continuous monitoring methods.
Posted: 16 Aug 2015 | Published: 16 Aug 2015


The Hidden Costs of Compliance: 3 Biggest Transactional Risks
sponsored by Avalara
WHITE PAPER: This white paper outlines the three most important transactional risks to look out for in your organization. Learn how to manage transactional activities in your accounting, ERP, and ecommerce system and make these systems more accessible and affordable.
Posted: 13 Aug 2015 | Published: 05 Nov 2014


How to Support IT with an Automated Monitoring Process
sponsored by Splunk
WHITE PAPER: This white paper introduces methodologies for incorporating a highly scalable engine for machine-generated IT data. Read on to learn how to collect, index and harness machine data across physical, virtual and cloud infrastructures.
Posted: 11 Aug 2015 | Published: 11 Aug 2015


Comparing App Release with and without Automation
sponsored by Automic
WHITE PAPER: This white paper explores the benefits of automating app deployment processes to reduce risk and compliance failure costs.
Posted: 07 Aug 2015 | Published: 08 Jul 2015


The Cyber Centric Enterprise: Maintaining a Dynamic Security Posture in a Chaotic Threat
sponsored by
VIRTUAL SEMINAR: This virtual event, produced jointly by ISACA,, and focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.
Posted: 05 Aug 2015 | Premiered: 28 Jul 2015

ECM Trends: Cloud, Compliance and Records Management
sponsored by OnBase by Hyland
EGUIDE: In this expert e-guide, you'll learn why ECM systems are becoming a staple in today's enterprises. Additionally, discover why ECM is considered the heart of a well-governed compliance policy.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

OnBase by Hyland

MSP Uses Automation for Better Backup, Compliance
sponsored by Solarwinds N-able
CASE STUDY: This white paper details how one multi-industry MSP was able to give their clients the data protection and compliance they needed through automation. Read on to learn about the benefits of MSP automation.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Solarwinds N-able

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015


Meaningful Use a Mixed Bag for Development of EHR Systems
sponsored by OnBase by Hyland
EGUIDE: Learn which EHR features and functions are mandated by ONC if healthcare systems and physicians want to attest to meaningful use, how meaningful use has driven the development of EHRs, and why vendors believe that regulatory pressure has prevented more user-friendly approaches.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

OnBase by Hyland

In Struggles, Meaningful Use Attestation Shapes EHR
sponsored by OnBase by Hyland
EGUIDE: How have meaningful use programs influenced EHR initiatives? Access this e-guide now to find out why collaboration efforts within the healthcare industry may lead to a kinder, gentler meaningful use program.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

OnBase by Hyland

Mapping the Cloud Maturity Curve: Adapting to the New Era
sponsored by IBM
WHITE PAPER: The following analysis of cloud maturity is based on findings from 784 surveyed IT leaders around the globe. Access now to unlock five key fundamentals of cloud maturity, from aligned strategy to good governance.
Posted: 17 Jul 2015 | Published: 31 Dec 2015


Avoiding Audit Surprises: Why License Compliance is a C-level Issue
sponsored by Matrix42
WHITE PAPER: This white paper examines how to optimize long-term license management and relieve your IT staff of manual tasks.
Posted: 16 Jul 2015 | Published: 30 Jun 2015


How To Solve The Compliance Challenge In The Cloud
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to find out how to solve the compliance challenge in cloud and virtual infrastructure environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


Rethinking License Management: Mobile App Delivery and Access Made Easy
sponsored by Matrix42
WHITE PAPER: This white paper outlines how to treat license management as a proactive process rather than just a standalone management tool. Continue reading to learn more.
Posted: 15 Jul 2015 | Published: 01 Jul 2015


Privacy Compliance Strategies from Leading Records Management Professionals
sponsored by IntraLinks, Inc
EGUIDE: This expert e-guide explores records and information management (RIM) professionals, and their likelihood to play a big role as businesses place increasing importance on privacy compliance. Uncover an interview with RIM expert John Isaza for insights on developing these programs.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IntraLinks, Inc

Tips For Securing Cloud-Based ECM And Enterprise Collaboration Tools
sponsored by IntraLinks, Inc
EGUIDE: This e-guide explores how companies can use enterprise collaboration tools to brainstorm ideas in a secure, recordable fashion. Join Forrester's Rob Koplowitz as he explains adoption trends for compliant technological teamwork, and learn the competitive potential of deploying sooner than later.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

IntraLinks, Inc

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015


Data as currency: Creating information value in the digital age
sponsored by
VIRTUAL ENVIRONMENT: As enterprises strive to find ways to monetize information, they must balance the impulse to exploit their data with security and privacy concerns. In this classroom, we'll explore how organizations can stay on the right side of the law as they extract value from data.
Posted: 15 Jun 2015 | Premiered: 08 Jun 2015

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

Claims Validation with smartC and the Hortonworks Data Platform
sponsored by Hortonworks
RESOURCE: Discover how your organization can prevent insurance fraud with better data management. Access this white paper to learn how you can solve common compliance and insurance challenges.
Posted: 03 Jun 2015 | Published: 03 Jun 2015


Harmonize File Sharing in Your Mac/Windows Environment
sponsored by Acronis
TRIAL SOFTWARE: Start your trial download for a file-and-print sharing tool today and mitigate protocol issues, performance, and compatibility problems. Discover three main benefits for Mac users in a Windows environment.
Posted: 29 May 2015 | Premiered: 29 May 2015


Hertz - World leading car rental company usesVMware View to simplify infrastructure andimprove user experience
sponsored by VMware
WHITE PAPER: This white paper explains how VMware can help you simplify your server and desktop environment through virtualization. Read now to find out how Hertz cut costs and improved compliance.
Posted: 28 May 2015 | Published: 28 May 2015


10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9 + Carbon Black
WEBCAST: This brief whiteboard video presents 9 best practices to securing store systems to comply with PCI standards.
Posted: 18 Jun 2015 | Premiered: Nov 9, 2012

Bit9 + Carbon Black
51 - 75 of 585 Matches Previous Page    1 2 3 4 5 6    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement