IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
51 - 75 of 466 Matches Previous Page  |  Next Page
8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 01 Oct 2018 | Published: 01 Oct 2018

ServiceNow

Balancing Security and Digital Transformation
sponsored by BT
EBRIEF: This e-brief examines security across three domains—cloud, compliance, and cyber threats—and makes recommendations that can help CISOs and their companies make security integral to the business. Read on to learn more.
Posted: 18 Sep 2018 | Published: 18 Sep 2018

BT

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint

The Critical Role Data Access Plays in Support of GDPR
sponsored by Gigamon
WHITE PAPER: Visibility into network data, wherever it resides, is foundational to maintaining GDPR compliance. Download this white paper for specific examples of where and how this applies to various articles within the regulation.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Gigamon

Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

CyberGRX

Australian Companies Leaving Themselves Exposed on Security and Compliance
sponsored by Mimecast
RESEARCH CONTENT: Uncover the shocking survey results from 193 Australian CIOs and IT Managers that reveal how far behind they are in preparing for regulations and training security staff.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Mimecast

Guide to PCI Compliance for Containers
sponsored by Twistlock, Inc.
RESOURCE: Explore this guide to learn how your containers can be brought into compliance with the PCI DSS in your cardholder data environment.
Posted: 09 Aug 2018 | Published: 09 Aug 2018


Guide to Modernizing Traditional Security: The Advantages of Moving a Legacy Application to Containers
sponsored by Twistlock, Inc.
RESOURCE: The trend of "lift and shift" has started to take off with moving applications to containerized environments. Read on to find out the advantages of taking a containerized approach with compliance, vulnerability management, and runtime defense.
Posted: 09 Aug 2018 | Published: 09 Aug 2018


Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Explore this resource as it will guide you through the ways you can achieve compliance with the HIPAA Security Rule for containerized workloads.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


The Hotel Hijackers
sponsored by Panda Security
WHITE PAPER: Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Panda Security

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
RESOURCE: Ready for SIEM deployment? Whether your goals are to detect threats, achieve compliance, or fuel incident response, these 6 steps to SIEM success will guide your team through key considerations to choose a SIEM platform that will work for your environment.
Posted: 31 Jul 2018 | Published: 30 Jun 2017

AT&T Cybersecurity

Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018

ServiceNow

A Risk Manager's Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
RESOURCE: Learn how you can evaluate your enterprise's security measures and maintain ongoing compliance with GDPR.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

BitSight

The CyberGRX GDPR Readiness Program
sponsored by CyberGRX
RESOURCE: Learn how to identify any gaps in your third-party program that could put you at risk of GDPR noncompliance.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

CyberGRX

Network Security Tools for GDPR
sponsored by Aruba Networks
WHITE PAPER: From data protection to network access security control, learn what cybersecurity tools are best positioned to help you anticipate, detect, and eliminate threats so that you can meet GDPR guidelines, even in complex, multi-vendor environments.
Posted: 03 May 2018 | Published: 03 May 2018

Aruba Networks

The Role of Crisis Communication in Business Continuity and Disaster Recovery
sponsored by OnSolve
WHITE PAPER: When a corporate crisis strikes, communication, whether internal or external, must be immediate and clear. This paper explores the challenge of modern crisis communication, from creating and controlling the message to determining who should deliver it, and how you can improve your strategies before after a disaster.
Posted: 01 May 2018 | Published: 31 Dec 2017

OnSolve

Process Automation and Content Integration: Orion Registrar Case Study
sponsored by K2
CASE STUDY: In this case study, find out how Orion Registrar adopted a modern BPM platform in conjunction with SharePoint so that they could streamline auditing and certification processes, simplify reporting, increase compliance, and more.
Posted: 12 Mar 2018 | Published: 31 Dec 2017

K2

How E-Signatures are Accelerating the Sales Process
sponsored by Adobe Inc
RESOURCE: Learn about Adobe e-signature technology and how it makes documents visible, verifiable, and fully digital for fast-paced sales processes.
Posted: 18 Sep 2017 | Published: 31 Dec 2015

Adobe Inc

Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

Get your Content Management System GDPR-Ready
sponsored by Box
EGUIDE: In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system.
Posted: 04 Apr 2018 | Published: 30 Mar 2018

Box

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

GRC Strategies for the Digital Business
sponsored by SearchCompliance.com
EBOOK: Digitization has become a fact life for businesses, but the increased data volumes and associated information security risk puts a strain on digital governance, risk and compliance resources. In this SearchCompliance handbook, learn how companies are adapting GRC budgeting and strategic processes to keep up with the speed of digital business.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

SearchCompliance.com

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft
51 - 75 of 466 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement