IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
1 - 25 of 414 Matches Previous Page  |  Next Page
Top Challenges in a Software Audit Guide
sponsored by ClearEdge
WHITE PAPER: It's bound to happen and it's probably coming sooner than you think: The dreaded software audit. Licensing compliance audits are standard practice for software publishers, and it's wise to take steps to prepare. This whitepaper teaches you how to get ready and respond.
Posted: 14 Sep 2021 | Published: 14 Sep 2021

ClearEdge

Software Audit Response Guide
sponsored by ClearEdge
WHITE PAPER: When you get audited, it's important to take appropriate steps and set the proper tone at the outset. Seemingly innocuous actions and omissions on your company's part can create significant downside in the findings from a software licensing audit. Get a Software Audit Checklist that lays out "7 Dos & 7 Don'ts" to survive your next audit.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

ClearEdge

Compliance in the Age of Digital Collaboration
sponsored by Proofpoint
EBOOK: Access this e-book to learn how to explore the challenges of capturing and managing a growing volume and diversity of business communications as well as how to solve today's toughest compliance challenges.
Posted: 28 May 2021 | Published: 28 May 2021

Proofpoint

Inventa for Wealth Management
sponsored by 1Touch.io
DATA SHEET: With 1touch.io’s Inventa, an AI-based sustainable data discovery tool, firms can move forward with their own digital initiatives while effortlessly staying on top of privacy requirements. Read this paper to learn how your organization can ensure sustainable data discovery and reduce the burden on data science teams with Inventa.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

1Touch.io

RECORDS MANAGEMENT TRENDS FOR 2021 A RESOURCE FOR PUBLIC AGENCIES
sponsored by Smarsh
ANALYST REPORT: The communications boom of the last 12 months has taught us that we need to be on top of our digital records. We need to know what forms of communication are the most prevalent, what activities count as public record and how we can improve our mobile policies. Access this guide to explore 5 key records management trends for 2021.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Smarsh

Text Message and Social Media Compliance Best Practices for Law Enforcement Agencies
sponsored by Smarsh
WHITE PAPER: The popularity of workplace SMS/text messaging and social media has exploded in recent years. Because of this, law enforcement needs to be aware of certain guidelines and considerations when allowing officers and agency employees to use these communication tools. Use this guide to learn how to stay SMS and social media compliant.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Smarsh

Data Privacy Tool Kit
sponsored by Imperva
EBOOK: Get a closer look at CCPA, steps for securing data to comply with GDPR, and 5 secure steps to NYDFS compliance, all inside the 2021 Data Privacy Toolkit.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Imperva

Magic Quadrant For IT Risk Management
sponsored by MetricStream
ANALYST REPORT: By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.
Posted: 21 Jan 2021 | Published: 11 Aug 2020

MetricStream

COMFORTE SECURDPS: ENTERPRISE SOLUTION FOR GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY: A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020

Atakama

COMFORTE AG SECUREDPS: PCI DSS TECHNICAL ASSESSMENT
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

One of the World’s Largest Fashion Retailers Chooses Tokenization
sponsored by Comforte AG
CASE STUDY: A major fashion retailer experienced a data breach when bad actors exploited gaps in their data security program. This prompted decision makers to invest in a more robust data security solution. By viewing this case study, you can learn how this retailer used Comforte’s data protection, encryption, and tokenization to bolster speed and security.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

COMFORTE SECURDPS: ENTERPRISE SOLUTION FOR CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Data Discovery And Classification: The Foundation Of Effective Information Governance
sponsored by HelpSystems
WHITE PAPER: With the right technology tools, a data discovery and classification exercise will enable an enterprise to find its sensitive data, label it with the appropriate sensitivity and ensure that you can demonstrate regulatory compliance. View this white paper to learn why organizations should take a joint approach to tackling big data.
Posted: 24 Nov 2020 | Published: 30 Oct 2020

HelpSystems

Intelligent Privacy Automation: The Future Of Data Privacy
sponsored by ServiceNow
WHITE PAPER: Growing privacy concerns and emerging data privacy laws require organizations to not only know the location and usage of all personal data, but operationalize their privacy policies and accommodate a timely response to data access requests. But how can you ensure you’re always in compliance? Read this white paper to get the answer.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Beyond Digital Risk— Addressing Operational Risk
sponsored by ServiceNow
WHITE PAPER: Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Regulatory Updates Roundup Of 10 Recent Finra And Sec Violations And Penalties
sponsored by Smarsh
WHITE PAPER: In this report, review 10 of the most notable violations to better understand how they occurred, as well as how firms are managing enhanced SEC and FINRA scrutiny. Download the Roundup of 10 Recent FINRA and SEC Violations and Penalties now!
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Smarsh

The Definitive Guide to Electronic Communications Capture
sponsored by Smarsh
WHITE PAPER: Is your organization under pressure to manage an ever-increasing volume and diversity of communications data? Download this Smarsh Definitive Guide to Capture to learn how your compliance program stacks up, and get the information you need to reduce your organizational risk.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Smarsh

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT: With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Achieving Security and Compliance for SAP HANA in the Cloud
sponsored by Thales
PRODUCT OVERVIEW: Although widely used for storing and processing sensitive data, achieving security and compliance for SAP HANA in the cloud goes beyond the scope of traditional security methods. Download this white paper to discover how Thales is addressing this trending issue.
Posted: 09 Jul 2020 | Published: 29 Feb 2020

Thales

3 Ways Modern Backup Supports Your Business During Uncertain Times
sponsored by Cohesity
DATA SHEET: With data volume continuing to grow, a simple and secure modern backup solution can help boost your organizational preparedness while supporting your IT efficiency, data recovery, and compliance goals. Access this data sheet to learn 3 ways modern backup can support your specific business during uncertain times.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Cohesity

GDPR vs CCPA
sponsored by Auth0
EBOOK: Inside this guide to GDPR vs. CCPA, discover what businesses need to know to close compliance gaps between the two laws and how Auth0’s identity management platform can help.
Posted: 19 May 2020 | Published: 19 May 2020

Auth0

Discovery Inc. | Case Study
sponsored by DivvyCloud
VIDEO: In this case study, find out how DivvyCloud allows Discovery to automate governance, offer flexibility, allow better insight and tighter controls and enhance compliance.
Posted: 08 Apr 2020 | Premiered: 08 Apr 2020

DivvyCloud

HIPAA Compliance Checklist: The Key to Staying Compliant in 2020
sponsored by Ostendio
EGUIDE: Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Ostendio
1 - 25 of 414 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences