Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
76 - 100 of 596 Matches Previous Page  |  Next Page
Avoiding Audit Surprises: Why License Compliance is a C-level Issue
sponsored by Matrix42
WHITE PAPER: This white paper examines how to optimize long-term license management and relieve your IT staff of manual tasks.
Posted: 16 Jul 2015 | Published: 30 Jun 2015


How To Solve The Compliance Challenge In The Cloud
sponsored by CloudPassage
PRODUCT OVERVIEW: Download this solution brief to find out how to solve the compliance challenge in cloud and virtual infrastructure environments.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


Rethinking License Management: Mobile App Delivery and Access Made Easy
sponsored by Matrix42
WHITE PAPER: This white paper outlines how to treat license management as a proactive process rather than just a standalone management tool. Continue reading to learn more.
Posted: 15 Jul 2015 | Published: 01 Jul 2015


Privacy Compliance Strategies from Leading Records Management Professionals
sponsored by IntraLinks, Inc
EGUIDE: This expert e-guide explores records and information management (RIM) professionals, and their likelihood to play a big role as businesses place increasing importance on privacy compliance. Uncover an interview with RIM expert John Isaza for insights on developing these programs.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IntraLinks, Inc

Tips For Securing Cloud-Based ECM And Enterprise Collaboration Tools
sponsored by IntraLinks, Inc
EGUIDE: This e-guide explores how companies can use enterprise collaboration tools to brainstorm ideas in a secure, recordable fashion. Join Forrester's Rob Koplowitz as he explains adoption trends for compliant technological teamwork, and learn the competitive potential of deploying sooner than later.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

IntraLinks, Inc

15 SIEM Products Analyzed and Reviewed
sponsored by IBM
WHITE PAPER: This resource objectively evaluates fifteen SIEM technologies and provides you with a detailed report of each one.
Posted: 24 Jun 2015 | Published: 25 Jun 2014


Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015


Data as currency: Creating information value in the digital age
sponsored by
VIRTUAL ENVIRONMENT: As enterprises strive to find ways to monetize information, they must balance the impulse to exploit their data with security and privacy concerns. In this classroom, we'll explore how organizations can stay on the right side of the law as they extract value from data.
Posted: 15 Jun 2015 | Premiered: 08 Jun 2015

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

Top Tips to Assure Records Management Compliance
sponsored by Iron Mountain
EGUIDE: This expert e-guide highlights the three missing links to assure records management compliance. Discover how companies can maintain documents and data that demonstrate the history assets, among other best practices, to help prove compliance.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Iron Mountain

PDF Collaboration and Productivity at a Price that Makes Business Sense
sponsored by Nuance
WHITE PAPER: In this white paper, learn about PDF software that allows users to easily create, assemble, convert, edit, search, secure, and print PDF documents and forms.
Posted: 29 May 2015 | Published: 29 May 2015


Hertz - World leading car rental company usesVMware View to simplify infrastructure andimprove user experience
sponsored by VMware
WHITE PAPER: This white paper explains how VMware can help you simplify your server and desktop environment through virtualization. Read now to find out how Hertz cut costs and improved compliance.
Posted: 28 May 2015 | Published: 28 May 2015


PDF Collaboration Efforts for Optimizing Workflow
sponsored by Nuance
WHITE PAPER: This white paper explores how to determine which PDF technologies will meet your collaboration workflow needs. You'll know you've formed an effective strategy when you discover 6 key benefits.
Posted: 28 May 2015 | Published: 31 Dec 2014


Achieve Data Governance and Quality With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper examines how public sector organizations are increasingly turning to technology to leverage information management. Discover how they overcame data governance, quality, and inadequate supporting technology challenges which allowed them to synchronized, consolidated, and shared vital citizen data.
Posted: 27 May 2015 | Published: 27 May 2015

Information Builders

PDF Security in Seconds
sponsored by Nuance
VIDEO: In today's business world, redacting information in sensitive documents can consume valuable time and money. This brief video explores how to make your documents, as well as entire folders, more secure in seconds with agile search capabilities. Tune in now and be well on your way to more compliant collaborations.
Posted: 22 May 2015 | Premiered: 02 Apr 2014


PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014


The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines IT's complex dichotomy of document protection versus access in the mobile age, while issuing the consequences of inadequate security. Read on to ensure that your organization is avoiding the business issues that impact the information security management of corporate documents and content.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

IntraLinks, Inc

When Retention Schedules Shouldn't Live Up to their Name
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you understand how retention schedules have unintentionally misled companies into keeping unneeded data. Learn why taking the leap to get rid of excess information is a solid way to govern it, lessen risk, and save money.
Posted: 19 Apr 2015 | Published: 20 Apr 2015

Iron Mountain

How to Determine Proper Protocol for ROT
sponsored by Iron Mountain
WHITE PAPER: This white paper offers recommendations for consolidating your Redundant, Obsolete and Trivial content (ROT.) Learn the importance of deleting electronic records after suitable retention periods, and how doing so yields multiple benefits.
Posted: 19 Apr 2015 | Published: 31 Dec 2014

Iron Mountain

Addressing HACCP Issues Within the Food and Beverage Industry Using ERP Software
sponsored by IFS
WHITE PAPER: Learn how your organization can put in place a system to comply with HACCP guidelines in this white paper. Uncover the importance of an effective ERP system in compliance for the purposes of gathering, tracking, and reporting functionality.
Posted: 17 Apr 2015 | Published: 17 Apr 2015


Could HIPAA Make Criminals Out of People You Know?
sponsored by 8x8, Inc.
WHITE PAPER: This white paper teaches you how to evaluate telecom providers for storing important data such as faxes, voicemail, and other PHI. View now to learn when to trust an organization as an associate and when to realize red flags are being raised.
Posted: 17 Apr 2015 | Published: 18 Aug 2014

8x8, Inc.

Records management strategies to maintain regulatory compliance
sponsored by
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

Infographic: The UK’s Evolving BYOD Strategies
sponsored by Dell, Inc.
WHITE PAPER: Access this informative infographic to uncover useful statistics uncovered by computer technology researchers regarding security concerns relevant to BYOD strategies.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Dell, Inc.

Compliance and Cost: Boost your PDF Protocol
sponsored by Nuance
WHITE PAPER: This brief white paper highlights technologies that enhance PDF production. Access this resource and uncover 13 advantages to leveraging this essential collaboration format.
Posted: 29 May 2015 | Published: 31 Dec 2014

76 - 100 of 596 Matches Previous Page    2 3 4 5 6 7    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement