IT Management  >   Systems Operations  >  

Compliance (Systems Operations)

RSS Feed   
ALSO CALLED: IT Compliance
DEFINITION: Acting according to accepted standards or licensing agreements.
Compliance (Systems Operations) Reports
76 - 100 of 472 Matches Previous Page  |  Next Page
Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

GRC Strategies for the Digital Business
sponsored by SearchCompliance.com
EBOOK: Digitization has become a fact life for businesses, but the increased data volumes and associated information security risk puts a strain on digital governance, risk and compliance resources. In this SearchCompliance handbook, learn how companies are adapting GRC budgeting and strategic processes to keep up with the speed of digital business.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

SearchCompliance.com

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

Beyond BYOD: How IoT and new tech is changing modern GRC
sponsored by SearchCompliance.com
EBOOK: As the IoT continues to gain popularity, capitalizing on its business benefits require big changes to companies' GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data management, security and compliance processes, and strategies to take full business advantage of IoT data.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

SearchCompliance.com

Cybersecurity and Privacy Compliance: The Delicate Balance
sponsored by SearchCompliance.com
EBOOK: This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

SearchCompliance.com

Software Compliance at a Fast Velocity
sponsored by Chef Software
WHITE PAPER: How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Chef Software

Cloud Risk Management: Governance Strategies to Protect Digital Assets
sponsored by SearchCompliance.com
EBOOK: In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

SearchCompliance.com

Endpoint Security Management: Beyond Antivirus
sponsored by SearchSecurity.com
EBOOK: Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SearchSecurity.com

Data Governance Strategies for the Digital Age
sponsored by SearchCompliance.com
EBOOK: The digital age has forced many companies to alter - and sometimes completely revamp - data governance processes. In this handbook, learn about big data governance complications and the latest information management strategies for adapting to increased storage needs, data-specific compliance mandates and security vulnerabilities in the digital age.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

SearchCompliance.com

Deploying Microsoft Exchange 2013 Just Got Easier
sponsored by Citrix
WHITE PAPER: Access this informative guide that explains how to deploy Microsoft Exchange 2013 with an ADC that ensures remote access and load balancing of core components.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Citrix

CIO Decisions E-Zine - February 2015
sponsored by SearchCIO.com
EZINE: When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.
Posted: 04 Feb 2015 | Published: 30 Jan 2015

SearchCIO.com

BYOD Compliance: Keep Mobile Data Regulation-Ready
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchCompliance.com

The SOX Effect
sponsored by SearchCompliance.com
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchCompliance.com

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

Four steps to ensure IT investments benefit regulatory compliance
sponsored by Hewlett Packard Enterprise
EGUIDE: In this expert e-guide, discover how companies can ensure new IT investments meet the business's regulatory needs in four simple steps.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Hewlett Packard Enterprise

Electronic discovery management in the age of big data
sponsored by SearchCompliance.com
EBOOK: Electronic discovery management can be daunting as data volumes grow exponentially. Learn cutting-edge e-discovery strategies to avoid legal complications in the big data era.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

SearchCompliance.com

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

What to Look For In a Backup Solution to Deliver Improved Business Continuity
sponsored by Datto, Inc.
WHITE PAPER: This expert guide provides tips on building a holistic backup solution that protects your business from potentially devastating downtime, no matter what the cause. Access now to learn how you can implement a successful business continuity plan and give your enterprise a competitive edge.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Datto, Inc.

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.
76 - 100 of 472 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement