IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
1 - 25 of 661 Matches Previous Page  |  Next Page
Gathering Valuable Insights from Network Machine Data
sponsored by Splunk
WHITE PAPER: Download this guide for an overview of how gathering and analyzing machine data on your network enables you to protect your corporate networks from attacks, provide visibility into network traffic, and determine your network's role in the availability and performance of critical services.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

Splunk

Australian Companies Leaving Themselves Exposed on Security and Compliance
sponsored by Mimecast
RESEARCH CONTENT: Uncover the shocking survey results from 193 Australian CIOs and IT Managers that reveal how far behind they are in preparing for regulations and training security staff.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Mimecast

Managing Security on Shared Resources
sponsored by WinMagic
WEBCAST: Watch this video to learn about SecureDoc, an encryption tool that can help you strengthen security and maintain compliance, while enabling employees to use their own devices safely.
Posted: 15 Aug 2018 | Premiered: Apr 3, 2017

WinMagic

Strengthening Your Security with SecureDoc
sponsored by WinMagic
WEBCAST: Watch this short video to learn about protecting your assets with SecureDoc, which can help strengthen your organization's security and remain compliant.
Posted: 15 Aug 2018 | Premiered: Aug 15, 2018

WinMagic

The Two Tribes of Marketing: GDPR has Created a Cultural Split in Marketing - Only one side can win...
sponsored by Marketo
ANALYST REPORT: 55% of businesses are marketing first, using GDPR compliance as an opportunity to improve customer engagement. In this report, take an in-depth look at the legal-first and marketing-first culture split and the importance of customer sentiment to how businesses use data.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Marketo

How CIOs are Achieving Compliance Using Encryption Management in the New Regulatory Era
sponsored by WinMagic
RESOURCE: Download this resource for a look at a CXO briefing with a 'how to' guide for a simplified approach to compliance with encryption management.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

WinMagic

Guide to PCI Compliance for Containers
sponsored by Twistlock, Inc.
RESOURCE: Explore this guide to learn how your containers can be brought into compliance with the PCI DSS in your cardholder data environment.
Posted: 09 Aug 2018 | Published: 09 Aug 2018


Guide to Modernizing Traditional Security: The Advantages of Moving a Legacy Application to Containers
sponsored by Twistlock, Inc.
RESOURCE: The trend of "lift and shift" has started to take off with moving applications to containerized environments. Read on to find out the advantages of taking a containerized approach with compliance, vulnerability management, and runtime defense.
Posted: 09 Aug 2018 | Published: 09 Aug 2018


Security Automation: Risks & Rewards for Your Security Program
sponsored by Skybox Security
EBOOK: Organizations are struggling to find a sufficient amount of trained security staff to keep up with the evolving threat landscape. That's where automation can help. Download this collection of articles to learn about automation for security, and the risks and rewards that come with it.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Skybox Security

Automated Security Management: The Importance of Visibility, Context and Automation
sponsored by Skybox Security
WHITE PAPER: Through 2020, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws, according to Gartner. But modern technologies, like automation, can help. This report provides an overview of essential security management tasks that can be automated and the components needed to ensure success.
Posted: 09 Aug 2018 | Published: 31 Jul 2018

Skybox Security

Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Explore this resource as it will guide you through the ways you can achieve compliance with the HIPAA Security Rule for containerized workloads.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


GDPR: 5 Lessons Learned Veeam Compliance Experience Shared
sponsored by Veeam Software
WHITE PAPER: GDPR has been in effect since May 25, 2018 but there are still many questions to be answered and lessons learned from this data privacy law. Download this white paper to see how Mark Wong, CIO of Veeam Software has learned a few lessons about GDPR.
Posted: 07 Aug 2018 | Published: 31 Jan 2018

Veeam Software

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 03 Aug 2018 | Published: 31 Oct 2016

IBM

Making Intelligent Decisions about Identities and their Access
sponsored by IBM
EBRIEF: Explore this e-brief to learn how identity governance and management can help your enterprise maintain strong control over user access to applications and carefully monitor how access entitlements align with business roles and responsibilities.
Posted: 02 Aug 2018 | Published: 31 Oct 2016

IBM

The Hotel Hijackers
sponsored by Panda Security
WHITE PAPER: Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Panda Security

Data Secret Revealed: A Collection of Security Customer Stories
sponsored by Splunk
EBOOK: Find out how several prominent organizations, such as Duke University, Discovery, Inc., the U.S. Federal Department, and the city of Los Angeles, upgraded to a SIEM platform and gained powerful security analytics insights.
Posted: 31 Jul 2018 | Published: 31 Dec 2017

Splunk

Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018

ServiceNow

Compliance: How a Layered Approach Helps you Breeze Through Audits
sponsored by Kaseya
WHITE PAPER: In a constant sea of network threats, you must demonstrate how your network addresses a growing list of compliance requirements. Unfortunately, many organizations have challenges demonstrating compliance for both general and vertical regulations. This resource will guide you through the latest regulations and how to take it layer by layer.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Kaseya

Gartner 2018 Magic Quadrant for Identity Governance and Administration
sponsored by IBM
RESEARCH CONTENT: Making sure the right people get access to the right resources at the right times and for the right reasons is of high importance for all security and risk management leaders today. Explore this analyst review for a breakdown of 15 Identity Governance and Administration (IGA) providers to compare which one is right for your organization.
Posted: 27 Jul 2018 | Published: 21 Feb 2018

IBM

The State of IoT Security: Security Takes a Back Seat
sponsored by Gemalto
WHITE PAPER: With IoT being a top concern, explore this white paper to find out how you can commit to the IoT journey, while still keeping security in mind.
Posted: 26 Jul 2018 | Published: 31 Dec 2017

Gemalto

Digital Transformation Starts with Security
sponsored by Microsoft
RESOURCE: Too many organizations don't realize how sophisticated cyberattacks have become. In the face of compliance challenges, healthcare organizations may struggle to determine where to begin their digital transformation journey. Keep reading to learn about making security end-to-end and creating a defense-in-depth plan.
Posted: 26 Jul 2018 | Published: 31 Dec 2017

Microsoft

Webinar: Solving Security and Compliance Challenges with Confidential Information Discovery
sponsored by Hyland
WEBCAST: When sensitive data ends up in unintended places, it creates security and compliance risks for the organization. Watch this webinar to learn how a confidential information discovery tool can help keep your organization secure.
Posted: 26 Jul 2018 | Premiered: Jul 26, 2018

Hyland

The Forrester Wave: Risk-Based Authentication
sponsored by IBM
RESEARCH CONTENT: Find out how risk-based authentication (RBA) providers such as CA Technologies, IBM, ThreatMatrix, and more, compare to each other to help your organization make the right choice, with security and risk in mind.
Posted: 26 Jul 2018 | Published: 17 Jul 2017

IBM

Information Privacy and Security: GDPR is Just the Tip of the Iceberg
sponsored by Hyland
RESEARCH CONTENT: Are you ready for GDPR and the requirements it introduces for information security, governance and privacy?
Posted: 26 Jul 2018 | Published: 31 Dec 2017

Hyland

Best Practices for Secure Authentication
sponsored by IBM
WHITE PAPER: Learn how your organization can establish a path to stronger authentication and choose an approach that balances both security and business needs.
Posted: 26 Jul 2018 | Published: 30 Jun 2017

IBM
1 - 25 of 661 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement