Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
76 - 100 of 598 Matches Previous Page  |  Next Page
Compliance Survey: Your Guide to What Experts are Saying
sponsored by Chef Software
WHITE PAPER: Access this survey report now to learn how to mitigate the struggles faced when companies assess compliance or attempt to fix a compliance violation or security vulnerability, what priorities to set when attempting continuous improvement on overall security and performance, and more.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Chef Software

RACQ: Audit Scare Led to Software Cost Containment Drive
sponsored by Snow Software
CASE STUDY: Read on to analyze how one software asset management (SAM) tool empowers organizations to strategically manage, optimize and contain software costs—taking the guesswork out of understanding license positions, and enabling businesses to respond to renewals and audits promptly.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Snow Software

The Differences Between Master Data Management (MDM) & True Data Governance
sponsored by Collibra
EBOOK: Master data management (MDM) and data governance go hand-in-hand. But too many times, organizations confuse the terms, or use them interchangeably. It's time to separate fact from fiction. Learn the 3 major differences between data governance and MDM.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Collibra

The Missing Piece in the GDPR Puzzle
sponsored by Collibra
EBOOK: The clock is ticking. Regulators will issue significant fines for GDPR non-compliance next year. However, with such a massive regulation, where do you begin? Access this resource to uncover how to prepare your organization in the countdown and discover how data governance can help ensure you're GDPR compliant.
Posted: 30 Mar 2017 | Published: 30 Mar 2017

Collibra

ANZ CIO Trends 2017 #1
sponsored by ComputerWeekly.com
EGUIDE: There are two things that keep CIOs awake at night – data breaches that affect the reputation of their firms, and the need to better understand customer needs. Against this backdrop, CIOs can no longer be content with keeping the lights on. Read how CIOs in Australia/New Zealand are demonstrating the value of IT within their organisation.
Posted: 05 Mar 2017 | Published: 05 Mar 2017

ComputerWeekly.com

SAP Licensing and the SAM Lifecycle
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) best practices can be applied to managing SAP licenses, but what exactly does SAM entail? Explore capabilities of SAM, and learn how you better leverage large ERP investments so you can achieve inventory accuracy, lower costs, enhanced governance and risk management, and more.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Snow Software

Focus ANZ: Internet of Things
sponsored by ComputerWeekly.com
EGUIDE: With Gartner predicting that 21 billion IoT devices will be in use worldwide by 2020, we explore how Australia/New Zealand enterprises are preparing for the IoT explosion; including a look at deployment and compliance frameworks, as well as areas where government and industry are lagging.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

University of Kansas Hospital Case Study
sponsored by Cisco Umbrella
CASE STUDY: Unlike many standard hospitals, a university hospital has to protect student data and large quantities of intellectual property alongside patient data. Access this case study to learn how The University of Kansas Hospital did all this while shortening investigation time and increasing visibility.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Cisco Umbrella

12 KPIs to Measure Your Spend Management Success
sponsored by Coupa
WHITE PAPER: How does your company stack up to your peers in regards to spend management? In this benchmark report by Coupa, discover 12 key performance indicators (KPIs) that you can use to monitor your company's effectiveness in spend management. Compare your businesses' performance to top companies across the world.
Posted: 31 Jan 2017 | Published: 31 Jan 2017

Coupa

Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

Discover the Cloudification of Healthcare IT
sponsored by Pure Storage
RESOURCE: Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PRESENTATION TRANSCRIPT: Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Citrix and Pure Storage

Best Practices for E-Discovery and Regulatory Compliance
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This Osterman Research white paper offers some best practices for how organizations can meet compliance requirements using Office 365. Find out how integrating 3rd party programs can build compliance capabilities in environments that operate in both Microsoft and non-Microsoft programs.
Posted: 28 Nov 2016 | Published: 30 Sep 2016

Proofpoint, Inc.

Records Management Strategies to Maintain Regulatory Compliance
sponsored by SearchCompliance.com
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

SearchCompliance.com

Critical Security and Compliance Considerations for Hybrid Cloud Deployments
sponsored by HPE and Intel® Xeon
WHITE PAPER: Standing in the way of total hybrid cloud adoption are significant security and compliance considerations. Access this white paper to find out where several industries stand in their hybrid cloud architecture adoption, the common compliance and security challenges each faces, and how you can best put your security tools to work.
Posted: 02 Mar 2017 | Published: 29 Jul 2016

HPE and Intel® Xeon

The Current State of Blockchain Compliance
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
Posted: 01 Mar 2017 | Published: 24 Feb 2017


United Breweries Finds the Recipe for Success with Refreshingly Rapid Compliance Reporting
sponsored by IBM
VIDEO: United Breweries wanted to streamline compliance and customer engagement, but their SAP HANA environment required a complex architecture that would further complicate things. Learn how the Kingfisher beer manufacturer was able deploy and integrate SAP HANA with a cloud platform.
Posted: 01 Mar 2017 | Premiered: 27 Oct 2016

IBM

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

The Security Balancing Act
sponsored by RES Software
RESOURCE: Learn the risks associated with mobile users and how to best protect your valuable data. Uncover best practices for securing your digital workforce and utilize a people-centric approach to managing security, governance, and identity and access management.
Posted: 17 Nov 2016 | Published: 30 Sep 2016

RES Software

Cb Defense: PCI DSS Anti-Virus Assessment
sponsored by Carbon Black
WHITE PAPER: This report shows the findings of Coalfire System Inc.'s independent technical assessment of Cb Defense next-generation antivirus platform.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Carbon Black

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

Transforming Finance Processes for the Digital Economy
sponsored by SAP
WHITE PAPER: Finance is at the heart of the digital business, but the financial processes and technology platforms that have been utilized in the last 20 years aren't agile enough for the digital economy. Access this white paper to explore a modern approach to managing critical processes like planning and analysis, risk management, compliance, and more.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

SAP

Top Priority IT Tasks: Risk Management and Regulatory Compliance
sponsored by Dell Software
EGUIDE: In this expert e-guide, we explore the issues of IT risk management and compliance. You'll learn about best practices for audits, the role log reviews play in monitoring IT security, how to build authentication into access management systems, and more.
Posted: 10 Oct 2016 | Published: 05 Oct 2016

Dell Software

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits
76 - 100 of 598 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement