IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC)Reports
1 - 25 of 220 Matches Previous Page  | Next Page
Mobility Tech Dossier: There's an App for That, But Is It Secure?
sponsored by Hewlett-Packard Company
WHITE PAPER: Security has eroded over the past decade as companies strive to create applications for multiple platforms by farming design and development out to subcontractors, straining the processes and governance put in place to ensure application security. Read this dossier for proven best practices to mitigate risk and embrace mobility without trepidation.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

Hewlett-Packard Company

Overcoming the Top 7 Challenges of Backup Compliance
sponsored by APTARE
WHITE PAPER: This white paper outlines 7 top compliance challenges that companies face in implementing SOX guidelines.
Posted: 17 Nov 2014 | Published: 28 Jun 2013

APTARE

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

A Cheat Sheet for Comparing Cloud Encryption Schemes
sponsored by SkyHigh
WHITE PAPER: This cheat sheet provides an overview of cloud encryption schemes and their relative strengths and weaknesses.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

SkyHigh

Comply Before You Connect: Security for Federal Agencies
sponsored by IBM
WHITE PAPER: This white paper discusses the use of "comply-to-connect" initiatives in federal agencies and proposes IBM Endpoint Manager as a solution to the need for continuous compliance.
Posted: 07 Nov 2014 | Published: 30 Sep 2013

IBM

Trends in Data Centric Security
sponsored by Intel® Services
WHITE PAPER: This white paper discusses Data Centric Security, which protects data when it is shared across multiple platforms, systems, or data centers by focusing security controls onto the data itself, rather than relying on the underlying infrastructure to keep it out of the wrong hands.
Posted: 05 Nov 2014 | Published: 14 Sep 2014

Intel® Services

Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER: Find out how adopting an Information Lifecycle Governance (ILG) approach can help you achieve success with information economics.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

IBM

Information Lifecycle Governance Requirements Kit
sponsored by IBM
WHITE PAPER: Find out what it takes to reach Level 4 maturity according to the Information Lifecycle Governance Requirements Kit.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

IBM

Best Practices -Maximizing Efficiency Through Service Automation
sponsored by FrontRange Solutions Inc.
WHITE PAPER: By automating provisioning, management, and remediation, you reduce operating costs and simplify users' information access time and process. Read on to learn the six challenges to conquer when automating existing processes and how to modernise your IT department into an innovation center.
Posted: 23 Oct 2014 | Published: 01 Oct 2014

FrontRange Solutions Inc.

Reap the benefits (and avoid the pitfalls) of big data info governance
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA International, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to mitigate risk and reduce costs by strategically integrating big data into your information governance efforts.
Posted: 17 Oct 2014 | Premiered: Oct 15, 2014

SearchCompliance.com

A Compliant, Accessible Storage Solution for ALM Data
sponsored by Avnet
VIDEO: This video introduces Avnet Archive Manager, a software solution that allows you to archive ALM data on a static archive and retrieval platform that is fully compliant with important regulations.
Posted: 14 Oct 2014 | Premiered: 18 Sep 2014

Avnet

Five Must-Haves for Enterprise File Sync and Share Flexibility
sponsored by Code42
WHITE PAPER: This is why it's vital to have an enterprise-grade sync and share solution in place, but what constitutes enterprise grade? Read this whitepaper for five must-haves for enterprise sync and share flexibility.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Data Governance and Compliance: Key Benefits and Risks
sponsored by CDW Corporation
EGUIDE: This expert e-guide explains some of the benefits of information governance as well as some of the complications that can often arise—such as trusting the information being utilized in auditing compliance.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

CDW Corporation

Governancy Tips for Midmarket IT Leaders
sponsored by Peak 10
WHITE PAPER: Access this resource for a guide to governance so you can maintain compliance and create business value.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Peak 10

Security Compliance:  A Common Thread
sponsored by CDW Corporation
RESOURCE: Access this infographic to discover how to properly secure your information and meet major compliance mandates for healthcare, finance and government data.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

CDW Corporation

Identity Management Challenges in an Increasingly Complex IT Environment
sponsored by Radiant Logic, Inc.
WHITE PAPER: This resource points out how organizations continue to struggle with identity management in such key areas as safeguarding against security breaches, enabling single sign-on for the extended organization, and automating key tasks instead of relying on manual intervention.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Radiant Logic, Inc.

Resolving the Catch-22 of UC&C in Regulated Environments
sponsored by Dimension Data
WHITE PAPER: This white paper explains why organizations in regulated sectors like finance, government, and healthcare have a different set of requirements for cloud-based unified communications and collaboration services, and introduces a suite of email and collaboration tools that meets these needs.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dimension Data

5 Practical Tips To Protect Manufacturing Trade Secrets
sponsored by Digital Guardian
WHITE PAPER: In this white paper, discover the threats to manufacturing trade secrets—and chances are, your intellectual property is already under attack.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Digital Guardian

Press the Start Button on Information Governance: From ‘Big Size’ to ‘Right Size’
sponsored by IBM.
WEBCAST: This webinar, featuring Cheryl McKinnon, Forrester principal analyst, will explain how to turn your unmanaged, unstructured data into relevant data, helping you jumpstart your information governance initiatives.
Posted: 22 Sep 2014 | Premiered: Sep 22, 2014

IBM.

Compliance Tips and Tricks for the Digital Age
sponsored by OpenText
EGUIDE: This expert e-guide reveals four valuable tips to dodge compliance challenges and meet regulatory requirements.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

OpenText

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Information Governance Risks of Microsoft Lync
sponsored by Actiance
WHITE PAPER: The IG risks of deploying Microsoft Lync are similar to those of other electronic communications such as email: malware, data leakage, inappropriate employee use, regulatory noncompliance, and skyrocketing legal costs.Download THIS WHITEPAPER to find out more!
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Actiance

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell
WHITE PAPER: This whitepaper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett-Packard Company
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett-Packard Company
1 - 25 of 220 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement