Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best Practices Reports
76 - 100 of 587 Matches Previous Page  |  Next Page
Gartner Market Guide for Data-Centric Audit and Protection (DCAP)
sponsored by IBM
WHITE PAPER: Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

How to Evaluate Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

Drawing business value from GRC analytics
sponsored by SearchCompliance.com
EBOOK: In this handbook, learn how companies are drawing business value from GRC analytics data and developing strategies to incorporate analytics best practices that benefit company-wide business processes.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

SearchCompliance.com

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper provides business planners with informative details on how to maintain strong security and PCI DSS compliance in a distributed retail environment. Access now for tools on how to keep applications, data and networks safe and PCI DSS compliant.
Posted: 15 Apr 2016 | Published: 01 Jan 2014

WatchGuard Technologies, Inc.

The CIO's Guide to Mainframes: Evaluating Sourcing Strategies to Mitigate Risk
sponsored by Windsor Group
WHITE PAPER: Discover in this guide how to formulate a sourcing strategy for your mainframe, starting with a baseline to identify how your decisions will affect staff, budgets, compliance, and cost, and align your outcome to current needs and future direction.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

Windsor Group

How HealthEast Care System Achieved EPCS Success
sponsored by Imprivata
VIDEO: In this short video, hear from key IT and clinical decision makers at HealthEast Care System as they describe how they achieved an efficient way to safely and securely electronically prescribe controlled substances.
Posted: 25 Mar 2016 | Premiered: 29 Feb 2016

Imprivata

Case Study: Protect Against Prescription Fraud with EPCS
sponsored by Imprivata
WHITE PAPER: The case study outlines Cambridge Health Alliance's drivers for implementing electronic prescribing of controlled substances (EPCS), and strategies and technologies for meeting DEA requirements. Gather best practice advice to help your healthcare organization achieve EPCS success.
Posted: 22 Mar 2016 | Published: 31 Dec 2015

Imprivata

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Protecting Patient Data in the Mobile Era
sponsored by SearchHealthIT.com
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

SearchHealthIT.com

Oracle database licensing challenges
sponsored by Matrix42
WHITE PAPER: This white paper shows you three examples businesses whose licensing agreements with Oracle fell short of expectations. Learn some of the shortcomings these businesses experienced to protect yourself from similar involvement.
Posted: 29 Feb 2016 | Published: 27 Jan 2016

Matrix42

Webinar & Demo: How to Manage SAP Licenses More Efficiently
sponsored by Snow Software
WEBCAST: In this webinar, you'll learn how to optimize your SAP landscape from a technical perspective. Tune in now and learn about technologies that collect, aggregate and analyze SAP usage data with complementary software asset management tools.
Posted: 24 Feb 2016 | Premiered: Jun 12, 2015

Snow Software

Stress Testing: A View from the Trenches
sponsored by SAS
WHITE PAPER: In this white paper, you will learn about various financial institutions and how well they are rising to the stress test challenge. See what areas are progressing and what areas still need to get up to speed.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

SAS

Financial Instruction Advantage and the Optimization of Information Processing
sponsored by SAS
WHITE PAPER: This white paper shows you a greater capability of model risk assessment. Avoid headline-grabbing risks and pressure from regulators by anticipating what's coming.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

SAS

Enterprise Stress Testing Systems from Chartis
sponsored by SAS
WHITE PAPER: Read this white paper to learn about compliance best practices for financial institutions to adopt.
Posted: 19 Feb 2016 | Published: 31 Dec 2015

SAS

Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

Database Security Tools: Purchasing Advice
sponsored by TechTarget
RESOURCE: The appeal of database security tools is that they don't alter the database or application, and they result in only minimal performance impacts. This expert guide compares the strengths and weaknesses of database security tools while offering 9 keys steps for procuring the right database security software for your enterprise.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

TechTarget

Putting Managed File Transfer in Perspective
sponsored by IBM
WHITE PAPER: This white paper helps you focus on the files that matter during your MFT integration. Access now to proactively govern your files' movements reliably, promptly and securely throughout your extended enterprise.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

IBM

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.
Posted: 14 Apr 2016 | Published: 31 Dec 2013

IBM

How to Keep Cloud Services Compliant with HIPAA Standards
sponsored by Actiance
EGUIDE: In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Actiance

Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

Compliance Standards for Data Governance
sponsored by Smarsh
EGUIDE: This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Smarsh

Tips and Tricks To Keep In Mind When Adopting A Hybrid Cloud Strategy
sponsored by SimpliVity
EGUIDE: Many small to medium-sized businesses have moved parts of their infrastructure to the cloud, but larger organizations have been slower to adopt this strategy because they already have an infrastructure in place. This e-guide details how the hybrid cloud allows these organizations to leverage their on-premises infrastructure as well as the cloud.
Posted: 25 Feb 2016 | Published: 18 Feb 2016

SimpliVity

Addressing PCI Compliance
sponsored by CA Technologies.
WHITE PAPER: Read this white paper to learn how you can meet the requirements of Payment Card Industry Data Security Standard version 3 and better protect your network.
Posted: 01 Feb 2016 | Published: 16 Dec 2015

CA Technologies.

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software
76 - 100 of 587 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement