IT Agents  >   IT Workforce  >   Executive Management  >   Corporate Governance  >  

Governance, Risk, Compliance (GRC)

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Combined area of focus within an organization that developed because of interdependencies between the three components.
Governance, Risk, Compliance (GRC) Reports
1 - 25 of 223 Matches Previous Page  |  Next Page
Manage Threats with Governance and a DLP Suite
sponsored by Varonis
EGUIDE: This expert guide discusses the benefits of both governance and data loss prevention (DLP) solutions, and it gives advice for being smart when implementing these systems.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Varonis

Managing Your Dark Data
sponsored by Symantec Corporation
EGUIDE: Discover how your business can take steps to manage your dark data to determine what is useful and what can be eliminated. Access this eGuide now to get 6 steps to dark data information governance.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Making the Most Out of Your Mobile Information Governance Strategy
sponsored by Symantec Corporation
EGUIDE: In this e-guide, you'll uncover five important tips that will help you to steer your mobile information governance strategy in the best direction. Read now to learn how to make the most out of your BYOD and security policies to fit your company's needs.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

Rethinking Cloud Content Collaboration in Financial Services
sponsored by Box
WHITE PAPER: Access this white paper to see how cloud-based content collaboration can meet customer demands in financial services while increasing productivity, and allowing the business to get around capacity and speed-to-market issues.
Posted: 20 May 2015 | Published: 20 May 2015

Box

Managing Regulatory Examinations - Streamlining the Process
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn how to streamline the document review process and ensure preparation for regulatory exams.
Posted: 19 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Enterprise-grade management for Amazon Web Services (AWS)
sponsored by Red Hat
WHITE PAPER: This technical detail describes how Red Hat® CloudForms offers you a unified management framework with advanced life cycle management capabilities across infrastructure platforms, such as OpenStack®, VMware, Red Hat, and Amazon.
Posted: 14 May 2015 | Published: 31 Dec 2013

Red Hat

Case Study: Coca-Cola Reduces its Migration Timeline by 33%
sponsored by Dell Software
WHITE PAPER: This brief white paper pinpoints savvy strategies for email migration, using CCBCC as an example. Discover ways to transition with ease of installation, technical support and cost-cutting migration technology.
Posted: 13 May 2015 | Published: 28 Sep 2012

Dell Software

Email Migration: Don't be a Burden, be On-Budget
sponsored by Dell Software
WHITE PAPER: This white paper emphasizes ways to mitigate the risks of email transitioning. Discover how to reduce the burden on the migration team and help desk while reaping six key benefits
Posted: 13 May 2015 | Published: 31 Dec 2014

Dell Software

Data Breaches: Technical Options to Avoid Bad Press and Sales
sponsored by Absolute Software
WEBCAST: This webinar features Stephen Treglia, formerly of the Technology Crime Unit in New York, in addition to Geoff Glave, Senior Product Manager at Absolute Software. Join them as they take an in-depth look at technical options to consider that could help you minimize - or even avoid - security breaches.
Posted: 07 May 2015 | Premiered: Jul 22, 2014

Absolute Software

Information Governance in Federal Agencies
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, discover a 4 step plan for designing, managing, and retaining an information governance program to firm up security and gain granular control over data.
Posted: 06 May 2015 | Published: 24 Feb 2014

Hewlett-Packard Company

The Evolution of Provisioning
sponsored by RSA
WHITE PAPER: This white paper explores the future of provisioning strategies, otherwise known as provisioning 2.0, and how to weave it into the business process fabric to better govern identity access and management.  View now to learn more.
Posted: 05 May 2015 | Published: 04 Dec 2014

RSA

Overcome Compliance Obstacles for Better Decision-Making
sponsored by SAS
WHITE PAPER: Learn how to keep your enterprise data in compliance while receiving support in; managing data for decision making, monitoring model risk and performance, implementing models with cost-effective automation and providing reconciliation between risk and finance.
Posted: 04 May 2015 | Published: 05 May 2015

SAS

Everything You Need To Know About Private Clouds
sponsored by Accelerite
EBOOK: This ebook highlights 6 major areas you need to focus on to successfully create a private cloud for your company.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Accelerite

The Security and Regulatory Drivers for Information Rights Management
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines IT's complex dichotomy of document protection versus access in the mobile age, while issuing the consequences of inadequate security. Read on to ensure that your organization is avoiding the business issues that impact the information security management of corporate documents and content.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

IntraLinks, Inc

Managing Enterprise-Wide Model Lifecycle Risk
sponsored by SAS
CASE STUDY: View this white paper to learn how to centralize model risk management and how to achieve a single-pane-of-glass view across the enterprise.
Posted: 24 Apr 2015 | Published: 28 Jan 2015

SAS

When Retention Schedules Shouldn't Live Up to their Name
sponsored by Iron Mountain
WHITE PAPER: This white paper will help you understand how retention schedules have unintentionally misled companies into keeping unneeded data. Learn why taking the leap to get rid of excess information is a solid way to govern it, lessen risk, and save money.
Posted: 19 Apr 2015 | Published: 20 Apr 2015

Iron Mountain

Information Maps: A Records Management Must
sponsored by Iron Mountain
WHITE PAPER: Whether you're in IT, records and information management, data security and privacy, data analytics, or other specific business units, read on to learn why visibility into where your information resides will enable various benefits.
Posted: 19 Apr 2015 | Published: 19 Apr 2015

Iron Mountain

Mobility in Government Services
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn how to get the most out of your EMM compliance strategy. View now to explore a helpful checklist.
Posted: 15 Apr 2015 | Published: 17 Dec 2014

BlackBerry

Mobile Management Compliance Checklist in Financial Services
sponsored by BlackBerry
WHITE PAPER: This white paper provides you with the essential questions to ask when evaluating an EMM solution and how to ensure compliance.
Posted: 14 Apr 2015 | Published: 04 Dec 2014

BlackBerry

Navigating the Legal and Compliance Implications of BYOD
sponsored by Dropbox for Business
WHITE PAPER: This white paper delves into the legal and compliance implications of BYOD and offers recommendations for setting up a successful strategy.
Posted: 30 Mar 2015 | Published: 04 Dec 2013

Dropbox for Business

5 Important Truths about Digital Workspaces in a Dangerous World
sponsored by RES Software
WHITE PAPER: In this white paper, explore the five truths that offer answers to those critical questions. Read on to learn how to protect your users and enterprise in the digital workspace age.
Posted: 24 Mar 2015 | Published: 14 Jan 2015

RES Software

How to Empower Mobile Users and Maximize Security and Compliance
sponsored by RES Software
WHITE PAPER: In this white paper, learn the four simple steps to enabling anywhere, any device computing while securing multiple end points and access management.
Posted: 23 Mar 2015 | Published: 07 Jan 2015

RES Software

Shellshock: Best practices for responding to the next vulnerability or Six best practices for successful vulnerability response
sponsored by Alert Logic
WHITE PAPER: In this white paper, uncover the six steps to effective vulnerability response and how to craft your defensive strategy.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic

"IDC survey data suggests managed SIEM solutions are worth a lookIDC data suggests managed SIEM can offer better security than internal IT 60% of organizations say managed SIEM solutions improve security over internal IT"
sponsored by Alert Logic
WHITE PAPER: In this white paper, explore how SIEM systems close visibility gaps. Learn how to choose the right platform for your organization and maximize the benefits today.
Posted: 17 Mar 2015 | Published: 05 Nov 2014

Alert Logic

Are you regularly monitoring log data?
sponsored by Alert Logic
WHITE PAPER: In this quick infographic, you will learn the 13 collections and alerts that help support the infrastructure security of an automated log management system.
Posted: 17 Mar 2015 | Published: 04 Feb 2015

Alert Logic
1 - 25 of 223 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement