Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
51 - 75 of 614 Matches Previous Page  | Next Page
Verizon PCI Report: Pen Testing, Passwords Cause PCI Assessment Gaffes
sponsored by Pwine Express
WHITE PAPER: In this expert guide, get critical insights on how you can help your organization meet PCI compliance regulations despite the many security challenges.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

Pwine Express

Learn How to Successfully Manage a Continuous Monitoring Program
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This paper provides an introduction to Continuous Monitoring (CM), including definitions and common misperceptions. Learn how to successfully manage your own CM program.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

RSA, The Security Division of EMC

Biotechnology Company Automates Compliance, Delivers Cloud Services
sponsored by Hewlett-Packard Company
WHITE PAPER: Reduced provisioning from weeks to minutes.HP cloud and automation solutions helped a biotechnology company achieve a level of control that is unprecedented in its sector. Get the details by downloading and reading the case study.
Posted: 03 Sep 2014 | Published: 30 Jun 2014

Hewlett-Packard Company

Managed Mobility Services: Reduce Your Risk and Improve Productivity
sponsored by Hewlett-Packard Limited
WHITE PAPER: Learn how HP Managed Mobility Services can help your organisation manage secure access to applications and data, and let users store, sync and share files anytime, anywhere, from any mobile device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Limited

Internal Audit: Challenges and Solutions to Alignment
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this whitepaper, learn how Internal Audit (IA) can benefit from partnering with these organizational groups while maintaining a certain level of independence.
Posted: 02 Sep 2014 | Published: 01 Oct 2013

RSA, The Security Division of EMC

Information Security Magazine: September 2014
sponsored by SearchSecurity.com
EZINE: Open source software vulnerabilities have security executives worried. Lower your risk by revisiting application security policy and enforcing development best practices.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

SearchSecurity.com

Demystifying Industry Standards
sponsored by IBM
EBOOK: Access the following e-book to learn how industry standards are affecting the way businesses work, how to alleviate many of the complexities associated with them, and how to successfully tackle the initiative as a whole.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

IBM

How Do Top SIEM Products Compare in Common Client Deployment Scenarios?
sponsored by IBM
WHITE PAPER: This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.
Posted: 27 Aug 2014 | Published: 25 Jun 2014

IBM

Get the most from Microsoft - HP Software Licensing Service for Microsoft Solutions
sponsored by Hewlett-Packard Limited
WHITE PAPER: Large-scale users of Microsoft products make substantial investments in the company's software. This quick whitepaper discusses software licensing services to better manage licensing for large scale companies. View now to see essentials to handling Microsoft software agreements.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Hewlett-Packard Limited

Information Archiving: White Board Video
sponsored by Hewlett-Packard Company
WEBCAST: Watch this informative video to find out about an information archiving solution that will help your organization centralize data from key information sources across the enterprise.
Posted: 25 Aug 2014 | Premiered: Aug 25, 2014

Hewlett-Packard Company

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

Nationwide commercial uses Qlikview for portfolio-level analytics and business discovery
sponsored by QlikTech, Inc.
CASE STUDY: Nationwide Commercial needed a way to analyze predictions for future loan behavior, improve ease of compliance, mitigate risk, improve capital consumption, and maximize returns. The following report examines how QlikView was able to help them attain these goals and ultimately, what you can do to achieve similar results.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

QlikTech, Inc.

Reduce your software spend - HP Software Licensing and Management Solutions (SLMS)Software Asset Management (SAM)
sponsored by Hewlett-Packard Limited
WHITE PAPER: Decreasing budgets are forcing enterprises to demand services that are tailored to fit specific business requirements. This whitepaper considers one SLMS option that covers cloud, virtualization, mobility, and BYOD. View now to see the results some companies have seen.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

Hewlett-Packard Limited

Optimize your software investment - HP Enterprise Software Licensing and Management Solutions (SLMS)
sponsored by Hewlett-Packard Limited
WHITE PAPER: It is increasingly difficult for enterprises to purchase and deploy assets using a multitude of vendors, devices and platforms. This whitepaper discusses software licensing and management solutions (SLMS) and the advantages of systems like this.
Posted: 21 Aug 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Limited
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Limited

Reduce Security Breaches and Manage Risk with a Fax Security Strategy
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Use Cloud-Based Fax Messaging to Improve The Security of Healthcare Information
sponsored by OpenText
WHITE PAPER: In this resource, learn how one cloud-based fax messaging solution will secure patients' information at a low cost and meet federal regulations.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

Enabling Mobile Users and Staying Compliant: How Healthcare Organizations Manage Both
sponsored by BlackBerry
WHITE PAPER: In this white paper, discover a mobile security solution that provides containerization, application-wrapping and secure connectivity to healthcare organizations, helping prevent data breaches and meet compliance regulations.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

BlackBerry

Reducing security risks from open source software
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights how your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Posted: 18 Aug 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

Meet Compliance Guidelines Effectively with Log Management Solutions
sponsored by LogRhythm, Inc.
WHITE PAPER: In this in-depth guide, learn how to more efficiently meet compliance recommendations with new log management and analysis solutions.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

LogRhythm, Inc.

Mobile Security: Overcoming Obstacles, Reducing Risk
sponsored by SearchSecurity.com
VIRTUAL TRADESHOW: Join ISACA, SearchCompliance.com, SearchSecurity.com and thousands of your fellow IT peers from around the world for a live virtual seminar, taking place on September 17th 2014, on how to secure your mobile workplace without sacrificing the business needs of end users.
Posted: 14 Aug 2014 | Premiered: Sep 17, 2014

SearchSecurity.com

Technology Tools and Policies for Corporate Compliance
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, we examine the technology tools and policies organizations are implementing as part of a wide-ranging corporate compliance program.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchCompliance.com

Attensity: Insurance Case Study
sponsored by Attensity
CASE STUDY: The following case study reveal the solution that a multi-billion dollar financial services company used to make faster, more accurate claim decisions, assign specialists to high-risk claims earlier in the process cycle, decrease the impact of insurance fraud, and more.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Attensity

Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes the capabilities of LogRhythm's automation suite for NERC CIP compliance, which helps organizations improve their overall security and compliance posture while reducing costs.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Expert Tips for Compliance and Managing Employee Data
sponsored by IBM
EGUIDE: This expert e-guide covers the key drivers behind the move to Software-as-a-Service (SaaS) and cloud-based applications, as well as important considerations to keep in mind when evaluating your choices. As you read, learn how to craft a comprehensive request for proposal (RFP) and overcome ongoing compliance and management challenges.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM
51 - 75 of 614 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement