Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed   
Compliance Best Practices Reports
1 - 25 of 614 Matches Previous Page  |  Next Page
Why Many Cloud Communications Providers Don't Like to Talk About Security, Compliance and Reliability
sponsored by 8x8, Inc.
WHITE PAPER: Learn how security, compliance and reliability are just as important for business communication systems and 10 tough questions you should ask your communications provider today.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

8x8, Inc.

Governing Risk Data Aggregation and Risk Reporting
sponsored by IBM
WHITE PAPER: Explore how new technology can help you kill 2 birds with 1 stone: Remain compliant with regulations such as GDPR, and still gain value out of your data.
Posted: 15 Mar 2018 | Published: 31 Aug 2017


Enabling Network Visibility and Dynamic Threat Migration
sponsored by Big Switch Networks
RESOURCE: In this technology overview, learn how a programmable SDN controller can help IT teams gain clear visibility into their network while addressing the challenges associated with traditional network security deployment options.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Big Switch Networks

Managing Your Data in a Hybrid and Multicloud World is Critical to Digital Transformation Success
sponsored by NetApp
RESEARCH CONTENT: In this IDC report, explore why organizations today are taking a more strategic approach to their cloud initiatives, as well as what you can do to help improve cost control, data portability, GDPR compliance and more.
Posted: 14 Mar 2018 | Published: 31 Oct 2017


Long-term Data Retention Drivers and Trends
sponsored by Druva Software
RESEARCH CONTENT: In this ESG brief, explore some of the major drivers pushing more and more of your contemporaries to adopt data archiving, as well as a deeper-dive into the importance of archiving in meeting increasingly strict compliance demands.
Posted: 14 Mar 2018 | Published: 30 Apr 2017

Druva Software

Inside Iron Mountain's Cloud
sponsored by Iron Mountain
RESOURCE: In this solution brief, learn about a secure cloud-based storage repository that can preserve your data for any length of time and provide you with a vast array of benefits.
Posted: 12 Mar 2018 | Published: 31 Dec 2017

Iron Mountain

Process Automation and Content Integration: Orion Registrar Case Study
sponsored by K2
CASE STUDY: In this case study, find out how Orion Registrar adopted a modern BPM platform in conjunction with SharePoint so that they could streamline auditing and certification processes, simplify reporting, increase compliance, and more.
Posted: 12 Mar 2018 | Published: 31 Dec 2017


Cloud migration: Choosing the right strategy and tools
sponsored by
EGUIDE: In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Meet Compliance Requirements for Network and Data Security
sponsored by HP
WHITE PAPER: Although many IT departments rigorously apply security measures to computers and the network, printing and imaging devices are often overlooked. But printers can provide an entry to your network, and securing them is just as important. This white paper reveals recommendations for print and document security so you can meet compliance regulations.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


If You Think Compliance is Expensive, Try Violations
sponsored by Oracle
WHITE PAPER: You don't need to be a victim of a cyberattack for your information systems to be on the wrong side of compliance regulations. Explore this white paper to discover how to prepare your sensitive data in the cloud for compliance regulations.
Posted: 07 Mar 2018 | Published: 07 Mar 2018


Is Compliance Being Left to Chance?
sponsored by Oracle
WHITE PAPER: Tap into this resource to learn how cloud and AI technologies may hold the key to managing compliance and security in a clear, consistent, and efficient way.
Posted: 06 Mar 2018 | Published: 06 Mar 2018


Accelerate Your Digital Transformation with SAP on Azure
sponsored by Microsoft
RESOURCE CENTER: Learn how you can reliably run mission-critical SAP workloads and scenarios on a scalable, compliant cloud platform, and find out how companies like ASICS and the Mosaic Company are already harnessing SAP and Azure.
Posted: 05 Mar 2018 | Published: 05 Mar 2018


Responding Efficiently to Major Data Breaches
sponsored by Nuix
WHITE PAPER: In this white paper, learn about the GDPR's 72-hour breach notification rule, as well as a platform designed to help you comply to this new regulation through deep content scans, automatic termination of malicious processes, and more.
Posted: 27 Feb 2018 | Published: 27 Feb 2018


Understanding the General Data Protection Regulation
sponsored by Evident
RESOURCE: The primary purpose of GDPR is to protect personal data. To avoid stiff GDPR penalties and ensure your data is protected, your business will need to spend a great deal of time assessing and planning to implement operational and technology changes. Here are 5 areas you'll need to consider.
Posted: 22 Feb 2018 | Published: 22 Feb 2018


Governance, Risk, and Compliance: The Business and IT Challenge
sponsored by ServiceNow
RESOURCE: This resource reveals the 6 benefits of the ServiceNow Governance, Risk, and Compliance (GRC) unified platform. Learn how to effectively respond to security risks in real-time through continuous monitoring, prioritization and automation and uncover key use cases.
Posted: 20 Feb 2018 | Published: 20 Feb 2018


Complying with Data Protection Law in a Changing World
sponsored by Forcepoint
VIDEO: Watch this webcast to learn some of the best strategies for answering compliance questionnaires, and some common compliance themes that span many regulations. Then, take a deep-dive into article 5 of the GDPR, and learn how you can improve your data breach monitoring and identification procedure.
Posted: 19 Feb 2018 | Premiered: 12 Feb 2018


GDPR, Personalization Strategies, and the Customer View of Data Protection
sponsored by Tealium
RESEARCH CONTENT: In this DataIQ research report, find out how aware customers are of the way data is collected from their digital footprint, as well as how businesses will have to approach their reliance on customer data to deliver personalized customer experiences in light of GDPR compliance.
Posted: 16 Feb 2018 | Published: 31 Dec 2017


Employee & Device Monitoring: Dispelling the Myths
sponsored by Forcepoint
VIDEO: Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018


Simplify GDPR Readiness
sponsored by IBM
VIDEO: Watch this webcast as IT leaders from 3 organizations explore the requirements and ramifications of GDPR compliance. Then, learn about how one cloud provider partnered with 2 other technologies to deliver protection for virtual workloads and ensure that the penalties of the GDPR never land at your doorstep.
Posted: 16 Feb 2018 | Premiered: 26 Oct 2017


Backups and Data Protection for Accounting Firms
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Read this white paper to learn how accounting firms are using backup and data protection processes to keep their data safe and their clients happy, and how you can put these same practices to work in your own organization.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

StorageCraft Technology Corporation

Implications of the EU Cloud Code of Conduct on European Cloud Infrastructure
sponsored by IBM
RESEARCH CONTENT: Read this IDC research report to learn about the EU Cloud Code of Conduct (CoC) which establishes a set of data protection requirements and give guidance to cloud providers such as yourself as to how you can best address regulations like the GDPR.
Posted: 15 Feb 2018 | Published: 31 Jul 2017


Inside Microsoft 365 Enterprise: What it can do for Your Business
sponsored by Microsoft
WHITE PAPER: In this white paper, explore 7 key capabilities offered by the Microsoft 365 Enterprise platform, offering benefits ranging from improved productivity to TCO savings.
Posted: 12 Feb 2018 | Published: 31 Dec 2017


Why ISO/IEC 27001 Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: Access this white paper to learn how privileged access management is critical to ISO/IEC 27001 compliance to establish, implement, maintain, assess and continually improve a robust information security management system (ISMS).
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

Why HIPAA Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: In this white paper, gain valuable insights into automating privileged account management and streamlining compliance to meet HIPAA's requirements.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

Demystifying IT Risk to Achieve Greater Security & Compliance
sponsored by Lynx Technology Partners
WHITE PAPER: Discover 4 steps to help you create effective risk management so that you can get a better picture of the threats facing your organization and improve your defense against them.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners
1 - 25 of 614 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement