IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
201 - 225 of 450 Matches Previous Page  |  Next Page
BYOD: The Evolution of Mobile Security
sponsored by SearchSecurity.com
EGUIDE: This expert guide takes an in-depth look at the new technologies and innovations that are driving the shift towards enterprise mobility, along with how to adapt your management strategy to best take utilize them.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

SearchSecurity.com

Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SearchSecurity.com

Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Security as a Service: Benefits and Risks of Cloud-Based Security
sponsored by SearchSecurity.com
EGUIDE: Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

SearchSecurity.com

Mobile: The Technology Game-Changer in 2013
sponsored by SearchSecurity.com
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Three principles to Improve Data Security and Compliance
sponsored by IBM
WHITE PAPER: In this exclusive white paper, discover three key guiding principles that can help improve data security and compliance. Read on and also learn about how you can ensure that your private data remains private.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Tips to Develop the Right Retention Schedule for your Organization
sponsored by SearchCIO.com
EBOOK: Check in with the experts at searchCompliance.com to learn how a solid records retention schedule can track and maintain relevant legal and regulatory data.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

SearchCIO.com

Securing and Mitigating Risk in the Cloud
sponsored by SearchSecurity.com
EGUIDE: Cloud computing offers a number of upsides, but also sparks concerns about securing and mitigating risk in the cloud. Learn more in Modern Infrastructure, CIO Edition.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

SearchSecurity.com

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AT&T Cybersecurity
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AT&T Cybersecurity

How to Comply with the HIPAA Security Rule
sponsored by Thawte Inc.
EGUIDE: In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Thawte Inc.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

Healthcare Networking Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

SearchHealthIT.com

Where BCDR and GRC Come Together: A CIO's Guide
sponsored by Essextec
EZINE: In this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

State of the Data Center Survey
sponsored by Symantec Corporation
WHITE PAPER: Examine the results from a recent survey with IT execs around the globe to uncover the latest techniques your peers are utilizing to tackle today's increasingly complex IT environments and modernize their IT strategies to effectively leverage today's emerging technologies.
Posted: 31 May 2013 | Published: 31 May 2013

Symantec Corporation

Using Predictive Coding to Your E-Discovery Advantage
sponsored by SearchCIO.com
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

SearchCIO.com

Identity and Access Management Security Live Chat Transcript
sponsored by SailPoint Technologies
PRESENTATION TRANSCRIPT: In this presentation transcript, industry expert Peter H. Gregory answers your top questions about identity and access management (IAM) in a quick, easy to follow Q&A format.
Posted: 14 May 2013 | Published: 14 May 2013

SailPoint Technologies

Threat Detection (Antivirus Intrusion Prevention)
sponsored by SearchSecurity.com
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

May Information Security Magazine
sponsored by SearchSecurity.com
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

SearchSecurity.com

Build Your Identity And Access Management Strategy
sponsored by Symplified
WHITE PAPER: This Forrester Research, Inc., paper explores the current and future states of identity and access management and describes steps your organization should take to create an IAM strategy and successfully put it into use.
Posted: 26 Apr 2013 | Published: 14 Mar 2012

Symplified

Mitigating the Risks of IT Change
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. Cascade quickly provides a complete and accurate inventory of the IT environment, including an understanding of how services and their underlying infrastructure impact the business.
Posted: 19 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.

IT Handbook: Getting Over the Cloud Adoption Hurdle
sponsored by SearchCloudComputing.com
EGUIDE: This expert resource will take you through the fears associated with the public cloud, offer a cloud security to-do list and provide a guide to available services and products.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchCloudComputing.com

Managing Threat in a Digital Age
sponsored by IBM
WHITE PAPER: Access this comprehensive paper about managing threats in the modern, digital age to learn why security has become a C-suite priority, and find insight into various types of threats and uncover the three biggest steps execs should take toward building "security intelligence."
Posted: 08 Mar 2013 | Published: 31 Aug 2011

IBM
201 - 225 of 450 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info