Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
51 - 75 of 569 Matches Previous Page  |  Next Page
How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PRESENTATION TRANSCRIPT: Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Citrix and Pure Storage

Best Practices for E-Discovery and Regulatory Compliance
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This Osterman Research white paper offers some best practices for how organizations can meet compliance requirements using Office 365. Find out how integrating 3rd party programs can build compliance capabilities in environments that operate in both Microsoft and non-Microsoft programs.
Posted: 28 Nov 2016 | Published: 30 Sep 2016

Proofpoint, Inc.

Meet New Banking Regulations Without Losing Profitability With Liquidity Optimization
sponsored by SAS
WHITE PAPER: In this white paper, discover software that can help you comply to new banking regulations without compromising your profitability. This program offers a single data model for managing liquidity risk, optimization capabilities, a risk engine to help you prepare for multiple scenarios, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

A Path to Good Risk Taking Through Data Analytics
sponsored by SAS
WHITE PAPER: This white paper explores the strategic benefit of making analytics an integral part of your risk management plan. Inside, learn 11 principles for enhancing risk management and the way banks are currently leveraging analytics for risk assessment. You'll also find some risk management success stories.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

Cybersecurity Frameworks to Consider for Organization-wide Integration
sponsored by Global Knowledge
WHITE PAPER: Learn about common security frameworks such as NIST and COBIT implementation action plans, resources for additional information and the government's influence on cybersecurity. Evaluate other enterprises' security frameworks to best choose one for your organization.
Posted: 06 Oct 2016 | Published: 30 Sep 2016

Global Knowledge

Evolution of Regulatory Capital Planning, Measurement, and Management
sponsored by SAS
WHITE PAPER: A key drawback of the Basel framework is its focus on historical capital adequacy, which does not help assess the impact of stress events on banks. Learn about how banks need an appropriate system to combine compliance with these risk-based capital adequacy regulations.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

SAS

Removing the Risk from Compliance in the Cloud
sponsored by VMware
WHITE PAPER: Learn how to mitigate cloud security compliance concerns by aligning with the right cloud service provider. Discover how to ensure responsibilities are shared for meeting compliance and security requirements and maintain a stringent information security policy.
Posted: 19 Aug 2016 | Published: 01 Jul 2016

VMware

Compliance - The New Hot Button for CIOs
sponsored by VMware
WHITE PAPER: This informational white paper identifies the main purpose of compliance regulations, some of the risks that accompany enterprises who fail compliance audits, and reviews the best practices to ensure you have the right partner to meet your compliance requirements.
Posted: 16 Aug 2016 | Published: 01 Jan 2016

VMware

How a Top 10 Bank Uses A Data Analytics Tool to Manage Operational Risk
sponsored by Infogix
WHITE PAPER: In this case study, learn about the analytics tool a top 10 U.S. Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including reduced costs while increasing productivity, processed full audit in real time, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2014

Infogix

Smarter Commerce Spells Sweet Success for Gourmet Baker
sponsored by VAI, Vormittag Associates, Inc.
WHITE PAPER: Read this "Food Logistics" article to find out how, with the help of an IT vendor, a gourmet bakery called Love & Quiches overcame poorly integrated applications and the limitations of spreadsheets for record management. Learn how the ERP system Love & Quiches adopted afforded them compliance efficiencies, improved forecasting, and more.
Posted: 08 Jul 2016 | Published: 31 Dec 2015

VAI, Vormittag Associates, Inc.

Establishing Energy as Enterprise Currency
sponsored by Infor
WHITE PAPER: With energy costs now accounting for 80% or more of an industrial company's budget, you need to stay ahead of rising energy costs and tighter regulatory compliance requirements. Learn how you can minimize costs and risks of managing energy costs using certain best practices and taking advantage of enterprise asset management technology.
Posted: 06 Jul 2016 | Published: 31 Dec 2012

Infor

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

The Security Balancing Act
sponsored by RES Software
RESOURCE: Learn the risks associated with mobile users and how to best protect your valuable data. Uncover best practices for securing your digital workforce and utilize a people-centric approach to managing security, governance, and identity and access management.
Posted: 17 Nov 2016 | Published: 30 Sep 2016

RES Software

Cb Defense: PCI DSS Anti-Virus Assessment
sponsored by Carbon Black
WHITE PAPER: This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Carbon Black

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

Transforming Finance Processes for the Digital Economy
sponsored by SAP
WHITE PAPER: Finance is at the heart of the digital business, but the financial processes and technology platforms that have been utilized in the last 20 years aren't agile enough for the digital economy. Access this white paper to explore a modern approach to managing critical processes like planning and analysis, risk management, compliance, and more.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

SAP

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

How To Know If Your Organization Is Ready For Data Governance Software
sponsored by Veritas
EGUIDE: It's important to ensure your organization is ready for a governance tool, or your software purchase is likely to fall flat. This e-guide takes a look at three different scenarios where data governance tools are often used to help you determine if your organization is ready for data governance software.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Veritas

Well-Planned Desktop Auditing: Avoid Issues and Tackle Windows Configuration
sponsored by Dell Software
EGUIDE: This expert e-guide highlights the importance of well-planned desktop auditing and several key considerations to keep in mind to maximize the effectiveness of your next desktop audit. Access now and you'll also learn what's causing some IT professionals to resort to lying to get their audits passed.
Posted: 06 Oct 2016 | Published: 05 Oct 2016

Dell Software

How Audit Compliance and Cloud Adoption Affects IT Security
sponsored by Dell Software
EGUIDE: Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

Dell Software

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

Cloud Services Take Off, GRC Doesn't
sponsored by SearchSecurity.com
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

SearchSecurity.com

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

4 Steps to Effectively Managing Risk and Compliance for Financial Services
sponsored by IBM
WHITE PAPER: Learn why convergence is key to maximizing governance efforts, and discover the 4 steps financial services organizations can take to mitigate compliance risks.
Posted: 22 Jul 2016 | Published: 31 May 2011

IBM
51 - 75 of 569 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement