Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
76 - 100 of 540 Matches Previous Page  | Next Page
Executive Guide to SYSPRO Security for Auditing Assurance and Control
sponsored by SYSPRO
WHITE PAPER: This white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

SYSPRO

The Dynamic Duo: SAM & Security
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Trends Shaping Software Management: 2014
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers the importance of addressing application compatibility and license agreements when dealing with the BYOD trend.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

Software Asset Management: Pay Attention or Pay Up
sponsored by CDW Corporation
WHITE PAPER: This whitepaper covers how to take advantage of the software asset management industry in order to keep control of your software.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

CDW Corporation

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

The Expert's How-to on Vulnerability Management
sponsored by TechTarget
RESOURCE: How can enterprises get a better handle on vulnerabilities and ensure security issues aren't overlooked? With you in mind, we've created The Expert's How-to on Vulnerability Management which explores the steps you can take to develop a data breach incident response plan, the top five Web application vulnerabilities, and how to circumvent them.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

How To Successfully Achieve Records Management Compliance and Strategy
sponsored by Iron Mountain
EGUIDE: The following e-guide, created by the experts at SearchCompliance.com offers advice and tips on navigating the records management landscape as well as how to best assure records management compliance. Read on to learn more.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Iron Mountain

Best Practices for Organizational Records Management Strategy and Compliance Ready Records Retention Schedules
sponsored by Iron Mountain
EGUIDE: The following expert e-guide, created by experts at SearchCompliance.com explores the keys to a compliance ready records retention schedule as well as records management strategy such as researching and developing your policy. Read on to learn more.
Posted: 13 Mar 2014 | Published: 13 Mar 2014

Iron Mountain

Human Resources Document Management
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to examine several ways how you can off-load the time-consuming management of employee records, achieve a more rapid response to complex audit and discovery requests, mitigate risk, and protect vital documents.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

Iron Mountain

Testimonial: Cystic Fibrosis Trust
sponsored by CommVault Systems, Inc.
VIDEO: View the following webcast to reveal the solution Cystic Fibrosis Trust used to improve their information governance strategies that ultimately allowed them to decrease time to compliance, improve data insights, and more.
Posted: 07 Mar 2014 | Premiered: 07 Mar 2014

CommVault Systems, Inc.

Staying Compliant with BYOD
sponsored by CDW Corporation
EGUIDE: This expert e-guide explains how enterprise app stores can help enhance software license compliance and asset management by giving organizations better insight into employee-owned devices. Also, discover strategies to solve the compliance and management issues brought on by BYOD and mobile cloud applications.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

Crucial Considerations For Cloud Licensing
sponsored by CDW Corporation
EGUIDE: This expert e-guide from SearchCloudComputing.com offers a primer on cloud licensing. Read on to learn about your options for cloud license management, five licensing factors to consider when planning a cloud migration, and more.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

CDW Corporation

PST Archiving: What is it and How is it Done?
sponsored by CommVault Systems, Inc.
WEBCAST: This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files.
Posted: 06 Mar 2014 | Premiered: Jan 23, 2014

CommVault Systems, Inc.

Whitepaper on eDiscovery & Compliance for Edge data that is in process
sponsored by CommVault Systems, Inc.
DATA SHEET: This informative datasheet gives information on two solutions that can help organizations handle their own compliance and discovery workflows without the help (and expense) of outside consultants.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

CommVault Systems, Inc.

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

5 eDiscovery Challenges Solved
sponsored by CommVault Systems, Inc.
WHITE PAPER: This quick solution brief addresses the top 5 eDiscovery obstacles that stand in your way.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

CommVault Systems, Inc.

Mom, Apple Pie, and the Office of Comptroller of the Currency
sponsored by Iron Mountain
WHITE PAPER: Consult the following white paper to learn about the new OCC update to governance ruling. Uncover a solid footing on how to assess each vendor, calculate the risk management life cycle, and how you can successfully plan ahead for these changes.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Iron Mountain

HP Security Solutions
sponsored by Hewlett-Packard Limited
VIRTUAL ENVIRONMENT: This informative virtual environment addresses how your organization can approach security with the same agility you apply to business. Videos, case studies, data sheets and more will help you understand how to best stay ahead of the breach.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Avoiding Compliance and Shadow IT Risks in the Cloud
sponsored by CloudPassage
EGUIDE: This expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

CloudPassage

Expenses, VAT and HMRC Compliance in a Nutshell
sponsored by Concur Technologies
WHITE PAPER: 75% of senior finance leaders say they wish they knew more about employee expenses and VAT reclaim. If you're a member of that overwhelming population, then this e-book is for you. Download now to get a crash course on the often-misunderstood concepts of VAT, compliance, HMRC policies, and expenses.
Posted: 01 Apr 2014 | Published: 30 Nov 2013

Concur Technologies

Enterprise Information Archiving: It’s Time for a New Strategy
sponsored by OpenText
WHITE PAPER: Access the following white paper to discover what poor archiving really is. Learn if you're keeping too much or too little, where to turn for cost-effective storage, and more.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

OpenText

Compliance in the Cloud: Myth or Reality
sponsored by SunGard Availability Services
WHITE PAPER: This expert resource covers a series of frequently asked questions about cloud providers and how they handle data protection and compliance.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

SunGard Availability Services

For regulated industries: Learning within a multi-tenant SaaS architecture
sponsored by SuccessFactors
WHITE PAPER: This resource describes the need for compliance with Good Practice requirements in regulated industries, explores key challenges of the validation process for learning environments, and evaluates whether multi-tenant SaaS architecture is a viable option.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

SuccessFactors

Alternative Ways to Store Data
sponsored by Iron Mountain
EGUIDE: This expert e-guide covers some unconventional data center locations including under water. It will also advise you on how to do you due diligence in order to maintain compliance in the cloud.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Iron Mountain
76 - 100 of 540 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement