IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
1 - 25 of 431 Matches Previous Page  |  Next Page
Vendor Research Report for IT Risk Management
sponsored by MetricStream
ANALYST REPORT: By 2025, 50% of businesses will depend on risk management solutions. As such, security and risk management leaders are hunting for such solutions based on cybersecurity initiatives, board risk oversight and digital compliance obligations. Use this Gartner Magic Quadrant to evaluate the strengths and cautions of various players in the space.
Posted: 21 Jan 2021 | Published: 11 Aug 2020

MetricStream

Financial Grade APIs Using OAuth and OpenID Connect
sponsored by Curity AB
WHITE PAPER: OAuth and OpenID Connect are international standards that define methods for securing APIs. They carry much weight when it comes to financial compliance. In this white paper, explore various aspects of OAuth and OpenID Connect that can be used to conform to the revised Directive on Payment Services (PSD2) and the GDPR.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

Security and Compliance Automation for Financial Services
sponsored by Red Hat and Intel
WHITE PAPER: A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 14 Jan 2021 | Published: 14 Jan 2021

Red Hat and Intel

SASE and the Forces Shaping Digital Transformation Part 3: Government and Industry Regulations, and Global Social and Economic Forces
sponsored by Netskope
WEBCAST: SASE adoption must be done with an awareness of not just governmental and industry regulations, but also shifts in security budgets, the economy at large and even global conflicts and trade wars. View this blog post exploring SASE and these forces shaping digital transformation.
Posted: 12 Jan 2021 | Premiered: Nov 18, 2020

Netskope

ClearedIn for Slack
sponsored by Clearedin
PRODUCT OVERVIEW: The shift towards remote work has led to a rise in the use of cloud collaboration tools, like Slack. This solution brief highlights how ClearedIn can enhance security and compliance capabilities to keep your Slack users safe and productive – read on to get started.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

Clearedin

3 Top Ways to Improve Data Protection and Governance for Secure Remote Work
sponsored by Microsoft
RESOURCE: If you’re using Microsoft products such as Outlook or Teams, don’t you want to make sure that the data going through them is protected, compliant and governed? Well you’re in luck – Microsoft has released specific integrations designed to make these processes simpler. Download this article to see 3 key ways these solutions meet the challenge.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

Microsoft

Continuous Compliance on AWS
sponsored by AWS Mphasis/Stelligent
WEBCAST: Most of the typical activities involved in compliance are nothing more than ‘risk management theater’: a mere spectacle that has very little to do with assessing or reducing actual risk. What if there was a way AWS users could assess, audit and evaluate the configurations of their AWS resources on a continuous basis? This webcast explains how.
Posted: 11 Dec 2020 | Premiered: Oct 28, 2020

AWS Mphasis/Stelligent

Simplifying Cross-Framework Compliance Management
sponsored by Aptible
WEBCAST: Compliance professionals dread audits. With all of the standards and regulations organizations are held to, finding apt software to maintain compliance across multiple frameworks is an arduous process – until now. Check out this webcast from Aptible to get a look at how you can use automation to remove stress from audits.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

Aptible

Comforte SecurDPS: Enterprise Solution for GDPR
sponsored by Comforte AG
WHITE PAPER: Since the GDPR was enacted, organizations in the EU have had to tread carefully when it comes to security solutions. As it happens, the world is becoming more encrypted, and this encryption carries significant implications in data privacy. Access this white paper to learn about SecurDPS, an encryption architecture that keeps you GDPR compliant.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Comforte AG

The Maturity Model for Governance, Risk, and Compliance
sponsored by Aptible
EBOOK: For more than a decade, the GRC framework has helped companies maintain their data integrity and manage risk in an increasingly digital world. But with compliance growing more and more complex, your GRC operations need to mature as your business does. Scrutinize this guide to understand how to evolve your GRC model in 4 levels.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

How to Level Up Your Access Control
sponsored by Aptible
EBOOK: As an organization grows, more users and more systems mean exponentially more reviews. As compliance professionals know, this can become an unmanageable task – especially without the right tools. How can you help your organization to develop better access control? This guide from Aptible may provide the answer.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Aptible

Department Store Chain Stays Secure and Compliance
sponsored by Atakama
CASE STUDY: A large retail department store chain sought a solution that could secure its corporate files, including those within its human resources, legal, finance and regulatory departments. In this case study, get an inside look at how this chain was able to use encryption to reduce vulnerability and maintain regulatory compliance.
Posted: 04 Dec 2020 | Published: 30 Nov 2020

Atakama

Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

One of the World’s Largest Fashion Retailers Chooses Tokenization
sponsored by Comforte AG
CASE STUDY: A major fashion retailer experienced a data breach when bad actors exploited gaps in their data security program. This prompted decision makers to invest in a more robust data security solution. By viewing this case study, you can learn how this retailer used Comforte’s data protection, encryption, and tokenization to bolster speed and security.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Comforte SecurDPS: Enterprise Solution for CCPA
sponsored by Comforte AG
WHITE PAPER: Companies that receive personal information from California residents may require additional organizational and technical safeguards to satisfy the requirements of the CCPA. How can you make sure your business stays compliant? Examine this white paper to discover SecurDPS, a product that could help you stay within regulation.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Classification by Design: The Foundation of Effective Data Protection Compliance
sponsored by HelpSystems
WHITE PAPER: According to Forrester, a significant proportion of security decision makers have not invested in data discovery and classification. This is likely due to the growing complexity within compliance. This white paper may help you make sense of the chaos by outlining why regulatory data compliance is growing harder to achieve.
Posted: 01 Dec 2020 | Published: 30 Oct 2020

HelpSystems

Improve Employee Privacy & Organizational Security
sponsored by Dtex
WHITE PAPER: Enterprise security systems often collect more data than they need to – this creates unnecessary privacy issues and raises costs associated with excess data storage and processing. So how can enterprises mitigate these issues while still improving security? In this solution brief, learn how to collect only the data you need.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

Dtex

Salesforce Government Cloud Plus Security
sponsored by Salesforce
WHITE PAPER: This white paper provides an overview of Salesforce’s principles of trust and compliance specifically for Salesforce Government Cloud Plus in the context of Federal Risk and Authorization Management Program (FedRAMP) and the DoD Cloud Computing Security Requirements Guide (CC SRG). Download your copy to learn more.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Salesforce

Data Discovery and Classification: The Foundation of Effective Information Governance
sponsored by HelpSystems
WHITE PAPER: With the right technology tools, a data discovery and classification exercise will enable an enterprise to find its sensitive data, label it with the appropriate sensitivity and ensure that you can demonstrate regulatory compliance. View this white paper to learn why organizations should take a joint approach to tackling big data.
Posted: 24 Nov 2020 | Published: 30 Oct 2020

HelpSystems

How to Level Up Your Vendor Management
sponsored by Aptible
WHITE PAPER: Every company needs vendors, yet vendors increase your vulnerability to security threats. Many of the largest data breaches in the past decade or so have happened because of vulnerabilities from 3rd party vendors. Therefore, you must establish robust processes on both sides of vendor management. View this guide to learn more.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

Aptible

The Evolution of Evidence Collection
sponsored by Aptible
EBOOK: Evidence collection is mundane & exhausting, and what’s worse is that it can happen once a quarter or more. But despite its time-consuming nature, evidence collection is critical to passing an audit & proving compliance. By reading this guide, you can learn how to leverage automation to make evidence collection a bit less painful.
Posted: 16 Nov 2020 | Published: 16 Nov 2020

Aptible

Intelligent Privacy Automation: The Future of Data Privacy
sponsored by ServiceNow
WHITE PAPER: Growing privacy concerns and emerging data privacy laws require organizations to not only know the location and usage of all personal data, but operationalize their privacy policies and accommodate a timely response to data access requests. But how can you ensure you’re always in compliance? Read this white paper to get the answer.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

ServiceNow

Beyond Digital Risk— Addressing Operational Risk
sponsored by ServiceNow
WHITE PAPER: Operational risk management keeps companies ahead in their markets and fortifies their foundations, even on shifting ground. But due to its complexity, operational risk management often gets lost in the mix of other risk management strategies. Read this white paper to learn how you can connect risk across the enterprise.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

ServiceNow

Softline Solutions: Helping you to Achieve Compliance, Control & Cost Savings
sponsored by ServiceNow
VIDEO: This video gives you an overview of how Softline Solutions can help you to achieve Compliance, Control & Cost savings for you IT. Softline Solutions is ServiceNow's Premier Partner to help get the most value out of SAMPro.
Posted: 11 Nov 2020 | Premiered: 11 Nov 2020

ServiceNow

Placing compliance at the front of your customer strategy
sponsored by ServiceNow
VIDEO: Volksbank is a ‘front-runner‘ in implementing integrated their Risk and Compliance across their entire organization. Starting 3 years ago with GRC to Integrated Risk management with 1 system to have a ‘single source of truth’. Join this webinar to learn from best practices with IRM at the Volksbank.
Posted: 06 Nov 2020 | Premiered: 06 Nov 2020

ServiceNow
1 - 25 of 431 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info