IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
26 - 50 of 442 Matches Previous Page  |  Next Page
Halton Borough Council Supports Vulnerable Citizens with Veeam Intelligent Data Management
sponsored by Veeam Software
CASE STUDY: The challenge of ensuring exponentially increasing volumes of data are properly backed up is one which many enterprises can appreciate. To discover how Halton Borough Council ultimately achieved reliable, GDPR-compliant backups without draining vital resources, access the study now.
Posted: 22 May 2019 | Published: 22 May 2019

Veeam Software

TrueSight Cloud Security
sponsored by BMC
WHITE PAPER: Download this resource to learn how TrueSight Cloud Security can automate security and compliance checks and remediation across your multi-cloud platforms.
Posted: 17 May 2019 | Published: 17 May 2019

BMC

Compliance Needs Drive Data Access Auditing Requirements
sponsored by BMC
WHITE PAPER: More and more regulations are being passed that dictate increased effort be exerted to better secure and protect the accuracy and privacy of enterprise data. So how can organizations ensure they are in compliance with these regulations (and others)? Download this white paper for 4 data access auditing techniques to help maintain compliance.
Posted: 16 May 2019 | Published: 16 May 2019

BMC

How Data Security Enables Cross-Regulatory Compliance
sponsored by Comforte AG
WHITE PAPER: Understanding current regulatory expectancies and complying accordingly is crucial to the survival of any business storing potentially at risk data. Read this white paper to learn about recent international data protection regulations and discover how you can develop a data-centric compliance strategy.
Posted: 10 May 2019 | Published: 31 Jan 2019

Comforte AG

The Cost of Third-Party Cybersecurity Risk Management
sponsored by CyberGRX
RESEARCH CONTENT: Third-party breaches remain a dominant security challenge for organizations, with over 63% of breaches linked to a third party, according to the Ponemon Institute. In this report, find out more about the cost and efficacy of the tools and processes used to conduct third-party cyber risk management today.
Posted: 17 Apr 2019 | Published: 17 Apr 2019

CyberGRX

Data Protection Ascends the Business Agenda
sponsored by ComputerWeekly.com
EGUIDE: This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

ComputerWeekly.com

CyberGRX Risk Assessment Methodology
sponsored by CyberGRX
WHITE PAPER: CyberGRX assessments apply a dynamic and comprehensive approach to risk management. They aim to provide an in-depth view of how a vendor's security controls will protect against potential threats. Download this resource to learn how you can have an up to date view of your third-party portfolio, and spend less time filling in redundant spreadsheets.
Posted: 30 Oct 2018 | Published: 30 Oct 2018

CyberGRX

How ServiceNow has Transformed its GRC Processes
sponsored by ServiceNow
CASE STUDY: Learn about ServiceNow's GRC process transformation. Discover how they've moved from a time-consuming, siloed manual work approach, to a connected and automated process that supports their growth.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

ServiceNow

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 01 Oct 2018 | Published: 01 Oct 2018

ServiceNow

Balancing Security and Digital Transformation
sponsored by BT
EBRIEF: This e-brief examines security across three domains—cloud, compliance, and cyber threats—and makes recommendations that can help CISOs and their companies make security integral to the business. Read on to learn more.
Posted: 18 Sep 2018 | Published: 18 Sep 2018

BT

Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

CyberGRX

Australian Companies Leaving Themselves Exposed on Security and Compliance
sponsored by Mimecast
RESEARCH CONTENT: Uncover the shocking survey results from 193 Australian CIOs and IT Managers that reveal how far behind they are in preparing for regulations and training security staff.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Mimecast

GDPR: 5 Lessons Learned Veeam Compliance Experience Shared
sponsored by Veeam Software
WHITE PAPER: GDPR has been in effect since May 25, 2018 but there are still many questions to be answered and lessons learned from this data privacy law. Download this white paper to see how Mark Wong, CIO of Veeam Software has learned a few lessons about GDPR.
Posted: 07 Aug 2018 | Published: 31 Jan 2018

Veeam Software

The Hotel Hijackers
sponsored by Panda Security
WHITE PAPER: Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Panda Security

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
RESOURCE: Ready for SIEM deployment? Whether your goals are to detect threats, achieve compliance, or fuel incident response, these 6 steps to SIEM success will guide your team through key considerations to choose a SIEM platform that will work for your environment.
Posted: 31 Jul 2018 | Published: 30 Jun 2017

AT&T Cybersecurity

The Emergence of Unified Access Management
sponsored by OneLogin
EBRIEF: In a recent survey from 451 Research, 55% of respondents said security and compliance are what is stopping them from using a hosted IT infrastructure. Explore this business impact brief to see how unified access management can help alleviate these security concerns.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

OneLogin

The CyberGRX GDPR Readiness Program
sponsored by CyberGRX
RESOURCE: Learn how to identify any gaps in your third-party program that could put you at risk of GDPR noncompliance.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

CyberGRX

Network Security Tools for GDPR
sponsored by Aruba Networks
WHITE PAPER: From data protection to network access security control, learn what cybersecurity tools are best positioned to help you anticipate, detect, and eliminate threats so that you can meet GDPR guidelines, even in complex, multi-vendor environments.
Posted: 03 May 2018 | Published: 03 May 2018

Aruba Networks

4 Ways to Improve Your DevOps Testing
sponsored by xMatters, Inc.
WHITE PAPER: Explore some of the most common DevOps testing mistakes and learn how to optimize your testing processes. Delve down into topics like why service monitoring and testing matter, and how DevOps is failing 3 key tenets of privacy compliance.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

xMatters, Inc.

Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

Get your Content Management System GDPR-Ready
sponsored by Box
EGUIDE: In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system.
Posted: 04 Apr 2018 | Published: 30 Mar 2018

Box

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

GRC Strategies for the Digital Business
sponsored by SearchCompliance.com
EBOOK: Digitization has become a fact life for businesses, but the increased data volumes and associated information security risk puts a strain on digital governance, risk and compliance resources. In this SearchCompliance handbook, learn how companies are adapting GRC budgeting and strategic processes to keep up with the speed of digital business.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

SearchCompliance.com

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum
26 - 50 of 442 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info