IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
51 - 75 of 465 Matches Previous Page  |  Next Page
York Risk Services Group Creates a Robust, Standardized IT Security Framework
sponsored by ServiceNow
CASE STUDY: Learn how this leading insurance provider was able to improve incident response capabilities, launch a security incident response tool in just 6 weeks, build customer confidence, and more during a time of rapid growth.
Posted: 01 Oct 2018 | Published: 31 Jan 2017

ServiceNow

8 Simple Steps for Automating Governance, Risk and Compliance (GRC)
sponsored by ServiceNow
WHITE PAPER: Discover 8 simple steps to slash audit costs, improve efficiency, and minimize risk within your organization by automating your GRC.
Posted: 01 Oct 2018 | Published: 01 Oct 2018

ServiceNow

Balancing Security and Digital Transformation
sponsored by BT
EBRIEF: This e-brief examines security across three domains—cloud, compliance, and cyber threats—and makes recommendations that can help CISOs and their companies make security integral to the business. Read on to learn more.
Posted: 18 Sep 2018 | Published: 18 Sep 2018

BT

Analytics: The Key to Identifying and Mitigating Third-Party Risk
sponsored by CyberGRX
WHITE PAPER: Discover how ecosystem analytics allows companies to understand sources and levels of potential risk along from third parties with contextual information and comparative screening.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

CyberGRX

Australian Companies Leaving Themselves Exposed on Security and Compliance
sponsored by Mimecast
RESEARCH CONTENT: Uncover the shocking survey results from 193 Australian CIOs and IT Managers that reveal how far behind they are in preparing for regulations and training security staff.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Mimecast

The Hotel Hijackers
sponsored by Panda Security
WHITE PAPER: Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Panda Security

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
RESOURCE: Ready for SIEM deployment? Whether your goals are to detect threats, achieve compliance, or fuel incident response, these 6 steps to SIEM success will guide your team through key considerations to choose a SIEM platform that will work for your environment.
Posted: 31 Jul 2018 | Published: 30 Jun 2017

AT&T Cybersecurity

Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018

ServiceNow

Top Trends Shaping IAM In 2018 Landscape: The Identity And Access Management Playbook
sponsored by OneLogin
ANALYST REPORT: In this Forrester report, explore several trends that will have an impact of IAM budgets, skills, priorities, architectural decisions, the vendor landscape, and deployment options.
Posted: 26 Jul 2018 | Published: 09 Jan 2018

OneLogin

The Emergence of Unified Access Management
sponsored by OneLogin
EBRIEF: In a recent survey from 451 Research, 55% of respondents said security and compliance are what is stopping them from using a hosted IT infrastructure. Explore this business impact brief to see how unified access management can help alleviate these security concerns.
Posted: 25 Jul 2018 | Published: 25 Jul 2018

OneLogin

A Risk Manager's Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
RESOURCE: Learn how you can evaluate your enterprise's security measures and maintain ongoing compliance with GDPR.
Posted: 17 Jul 2018 | Published: 17 Jul 2018

BitSight

The CyberGRX GDPR Readiness Program
sponsored by CyberGRX
RESOURCE: Learn how to identify any gaps in your third-party program that could put you at risk of GDPR noncompliance.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

CyberGRX

Network Security Tools for GDPR
sponsored by Aruba Networks
WHITE PAPER: From data protection to network access security control, learn what cybersecurity tools are best positioned to help you anticipate, detect, and eliminate threats so that you can meet GDPR guidelines, even in complex, multi-vendor environments.
Posted: 03 May 2018 | Published: 03 May 2018

Aruba Networks

The Role of Crisis Communication in Business Continuity and Disaster Recovery
sponsored by OnSolve
WHITE PAPER: When a corporate crisis strikes, communication, whether internal or external, must be immediate and clear. This paper explores the challenge of modern crisis communication, from creating and controlling the message to determining who should deliver it, and how you can improve your strategies before after a disaster.
Posted: 01 May 2018 | Published: 31 Dec 2017

OnSolve

Process Automation and Content Integration: Orion Registrar Case Study
sponsored by K2
CASE STUDY: In this case study, find out how Orion Registrar adopted a modern BPM platform in conjunction with SharePoint so that they could streamline auditing and certification processes, simplify reporting, increase compliance, and more.
Posted: 12 Mar 2018 | Published: 31 Dec 2017

K2

How E-Signatures are Accelerating the Sales Process
sponsored by Adobe Inc
RESOURCE: Learn about Adobe e-signature technology and how it makes documents visible, verifiable, and fully digital for fast-paced sales processes.
Posted: 18 Sep 2017 | Published: 31 Dec 2015

Adobe Inc

4 Ways to Improve Your DevOps Testing
sponsored by xMatters, Inc.
WHITE PAPER: Explore some of the most common DevOps testing mistakes and learn how to optimize your testing processes. Delve down into topics like why service monitoring and testing matter, and how DevOps is failing 3 key tenets of privacy compliance.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

xMatters, Inc.

Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

Get your Content Management System GDPR-Ready
sponsored by Box
EGUIDE: In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system.
Posted: 04 Apr 2018 | Published: 30 Mar 2018

Box

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

GRC Strategies for the Digital Business
sponsored by SearchCompliance.com
EBOOK: Digitization has become a fact life for businesses, but the increased data volumes and associated information security risk puts a strain on digital governance, risk and compliance resources. In this SearchCompliance handbook, learn how companies are adapting GRC budgeting and strategic processes to keep up with the speed of digital business.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

SearchCompliance.com

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

Beyond BYOD: How IoT and new tech is changing modern GRC
sponsored by SearchCompliance.com
EBOOK: As the IoT continues to gain popularity, capitalizing on its business benefits require big changes to companies' GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data management, security and compliance processes, and strategies to take full business advantage of IoT data.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

SearchCompliance.com
51 - 75 of 465 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement