IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
1 - 25 of 465 Matches Previous Page  |  Next Page
TrueSight Cloud Security
sponsored by BMC
WHITE PAPER: Download this resource to learn how TrueSight Cloud Security can automate security and compliance checks and remediation across your multi-cloud platforms.
Posted: 17 May 2019 | Published: 17 May 2019

BMC

Compliance Needs Drive Data Access Auditing Requirements
sponsored by BMC
WHITE PAPER: More and more regulations are being passed that dictate increased effort be exerted to better secure and protect the accuracy and privacy of enterprise data. So how can organizations ensure they are in compliance with these regulations (and others)? Download this white paper for 4 data access auditing techniques to help maintain compliance.
Posted: 16 May 2019 | Published: 16 May 2019

BMC

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

How Data Security Enables Cross-Regulatory Compliance
sponsored by comForte AG
WHITE PAPER: Understanding current regulatory expectancies and complying accordingly is crucial to the survival of any business storing potentially at risk data. Read this white paper to learn about recent international data protection regulations and discover how you can develop a data-centric compliance strategy.
Posted: 10 May 2019 | Published: 31 Jan 2019

comForte AG

Single Touch Payroll: It's Time to Get Ready
sponsored by Ascender
WHITE PAPER: For many businesses, adaptation to the new STP legislation will take about a year—read this white paper for tips on smoothing the transition.
Posted: 09 May 2019 | Published: 31 Dec 2018

Ascender

Cohasset Associates Assesses IBM Cloud Object Storage's Compliance Capabilities
sponsored by IBM
WHITE PAPER: In this report, Cohasset Associates assesses IBM Cloud Object Storage's ability to meet the electronic records recording, storage, and retention requirements of the Securities and Exchange Commission, Financial Industry Regulatory Authority, and Commodity Futures Trading Commission.
Posted: 08 May 2019 | Published: 31 Dec 2018

IBM

Gauge your Data Security and Privacy Maturity
sponsored by Akamai Technologies
ANALYST REPORT: Download this Forrester assessment so you can gauge where your firm is on its data security and privacy journey and discover which core competencies you need to strengthen or develop.
Posted: 07 May 2019 | Published: 07 May 2019

Akamai Technologies

Laing O'Rourke Case Study
sponsored by Commvault
CASE STUDY: Read this study to see how one organization—suffering under the weight of their costly reliance on local tape backup—used a centralized data platform that granted them uniform compliance management and recovery of their entire backup estate, sprawled as it was across 150 locations.
Posted: 07 May 2019 | Published: 07 May 2019

Commvault

Lookout Enables GDPR Compliance
sponsored by Lookout
CASE STUDY: To comply with GDPR, organizations need to gain visibility and control over any data in their mobile fleet that could be compromised. Lookout is uniquely positioned to help organizations like Henkel comply. Download this case study to learn how Henkel remains compliant with GDPR using Lookout Mobile Endpoint Security.
Posted: 06 May 2019 | Published: 06 May 2019

Lookout

How to Gain Company-Wide Insights with Culture Assessments
sponsored by Survey Gizmo
EBOOK: With this e-book, learn how to best protect your organization from front-page compliance scandals by fostering a culture of ethics and compliance. Explore how to validate business decisions with ethical frameworks, and review the 7 elements of effective compliance.
Posted: 01 May 2019 | Published: 31 Dec 2017

Survey Gizmo

Partners Healthcare Turns to ClearSky Data for an All-in-one Storage Solution
sponsored by ClearSky Data
CASE STUDY: Download this study to discover how you can benefit, just as Partners HealthCare, the largest healthcare system in Massachusetts, did from employing an all-in-one backup solution to establish compliant data encryption, improve audit logging, and expand storage capacity as needs grow.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

ClearSky Data

Miles & Stockbridge Simplify eDiscovery, Backup and DR
sponsored by ClearSky Data
CASE STUDY: With their NAS system struggling to keep up, Miles & Stockbridge sought out alternatives. Read their study to see how they're now able to simplify their eDiscovery processes, protect 170 VMs, and satisfy ISO certification requirements with a scalable backup and DR solution.
Posted: 17 Apr 2019 | Published: 31 Dec 2018

ClearSky Data

The Cost of Third-Party Cybersecurity Risk Management
sponsored by CyberGRX
RESEARCH CONTENT: Third-party breaches remain a dominant security challenge for organizations, with over 63% of breaches linked to a third party, according to the Ponemon Institute. In this report, find out more about the cost and efficacy of the tools and processes used to conduct third-party cyber risk management today.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

CyberGRX

Three Key Risks and Opportunities of GDPR
sponsored by comForte AG
WHITE PAPER: Weigh the risks and opportunities and you will find that GDPR is a positive change for data-driven organizations. Read this white paper to learn how you can make both sides of GDPR work for you.
Posted: 15 Apr 2019 | Published: 31 Dec 2018

comForte AG

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

How Mobile Devices Simplify Manufacturing Compliance and Risk Management
sponsored by Samsung Electronics
RESOURCE: The global footprint of many manufacturing companies makes compliance with mandatory regulations particularly challenging. In this article, explore some potential bottlenecks in production processes that present challenges for manufacturing compliance and how mobile devices can deliver efficiencies.
Posted: 29 Mar 2019 | Published: 11 Mar 2019

Samsung Electronics

Why Homomorphic Encryption Alone is Security, Not Privacy
sponsored by Immuta, Inc
WHITE PAPER: If privacy is your goal, carefully consider the differences between privacy techniques and security techniques. Privacy can be improved with techniques like differential privacy and homomorphic encryption, but for totally different reasons. Read on to learn more.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Immuta, Inc

10 Best Practices for Data Archiving and Application Decommissioning
sponsored by Flatirons Digital Innovations
WHITE PAPER: To learn how to successfully archive and decommission legacy applications, download this paper. It shares 10 proven practices to help you in the process while avoiding common pitfalls.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Flatirons Digital Innovations

Your Key to Regulatory Compliance for Archive Data
sponsored by iTernity
PRODUCT OVERVIEW: To take advantage of a sustainable and cost-efficient archiving approach that complies with HIPAA, SOX, and SEC 17a-4(f), download the following paper. It details a solution that combines HPE StoreEasy Storage and iTernity Compliant Archive Software (iCAS) to fulfill the above.
Posted: 27 Feb 2019 | Published: 31 Dec 2017

iTernity

Audit-proof and Hardware-independent Archiving with iCAS
sponsored by iTernity
PRODUCT OVERVIEW: This paper will introduce you to a software-defined archiving system—iCAS—that protects data with the highest security standards for audit-proof compliance. Built to meet the most stringent requirements like HIPAA, HITECH, and the GDPR, learn how it can help your organization, as well.
Posted: 27 Feb 2019 | Published: 31 Dec 2018

iTernity

GDPR Compliant Archiving with iCAS
sponsored by iTernity
DATA SHEET: To help organizations maintain continuous GDPR compliance, iTernity has introduced their software-defined archiving solution. To learn about its GDPR-compliant features—like retention management and WORM data immutability—continue reading here.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

iTernity

How to Modernize Your SAP Archiving Infrastructure
sponsored by iTernity
WHITE PAPER: Download this paper to find out how to fulfill critical SAP archiving criteria using a software-defined archiving approach. Five business benefits and 4 areas in which the solution addresses compliance needs are inside.
Posted: 21 Feb 2019 | Published: 31 Dec 2018

iTernity

Compliance for Business Data: Benefits of Software-defined Archiving
sponsored by iTernity
WHITE PAPER: This paper digs into the iTernity Compliant Archive Software (iCAS), which enables organizations to flexibly archive data regardless of its size to fulfill compliance requirements. Read on to learn 6 benefits of iCAS, how it differs from traditional archiving tools, and how it can help you simplify compliant data management.
Posted: 21 Feb 2019 | Published: 31 Dec 2018

iTernity

iTernity iCAS Archiving Software Technical Overview
sponsored by iTernity
WHITE PAPER: With the iTernity Compliant Archiving Software (iCAS), you can store data flexibly and securely, and to properly fulfill manifold regulatory requirements. Read on to view the technical features and functionality detailed herein.
Posted: 20 Feb 2019 | Published: 31 Jan 2019

iTernity

How Does Software-defined Archiving Meet GDPR Requirements?
sponsored by iTernity
RESOURCE: View this resource for a side-by-side comparison of what the GDPR requires and how software-defined archiving tool iCAS fulfills those requirements, including the right to be forgotten, right of access by the data subject, and 6 more.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

iTernity
1 - 25 of 465 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement