Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed   
Compliance Best Practices Reports
1 - 25 of 540 Matches Previous Page  |  Next Page
Infographic: Gartner AI and compliance spending forecast
sponsored by ComputerWeekly.com
EGUIDE: More than 60 jurisdictions around the world have proposed or are drafting postmodern privacy and data protection laws as a result. This infographic shows Gartner AI and compliance spending forecast.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

ComputerWeekly.com

Greenville Health System
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Greenville Health, a not-for-profit healthcare network, partnered with Absolute to gain continuous visibility of their remote devices and data in order to strengthen their security posture while ensuring HIPAA compliance.
Posted: 24 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

Wichita State University
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Wichita State University’s (WSU) IT team partnered with Absolute to establish endpoint visibility and control protocols in order to protect their students and faculty while meeting compliance requirements.
Posted: 24 Feb 2020 | Published: 09 May 2019

Absolute Software Corporation

Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

Achieving HIPAA Compliance
sponsored by Absolute Software Corporation
WHITE PAPER: Tap into this HIPAA Compliance Guide to see how Absolute can help you eliminate compliance failures and provide you with endpoint visibility and control.
Posted: 21 Feb 2020 | Published: 21 Feb 2020

Absolute Software Corporation

CIS Critical Security Controls Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.
Posted: 14 Feb 2020 | Published: 02 Nov 2018

Absolute Software Corporation

HIPAA Compliance Evaluation Guide
sponsored by Absolute Software Corporation
DATA SHEET: To comply with the HIPAA Privacy Rule and Security Rule, Covered Entities (CEs) and their business associates must implement administrative, physical, and technical safeguards across their endpoint populations. In this guide, see how Absolute can help.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Absolute Software Corporation

GoAnywhere MFT
sponsored by Help/Systems
DATA SHEET: GoAnywhere MFT is an enterprise-level solution which will secure, automate and manage all of your organization’s file transfer needs through a single interface. In this data sheet, learn how GoAnywhere MFT can help your organization comply with data privacy regulations.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Help/Systems

Secure Managed File Transfer: Ultimate Buyer's Guide
sponsored by Help/Systems
WHITE PAPER: Every day, organizations may exchange a considerable amount of files. Because of the sensitive information often contained in files, data transfers should be protected. In this white paper, learn how secure managed file transfer can help your organization protect the data your sharing.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Help/Systems

Replacing FTP Scripts with Managed File Transfer
sponsored by Help/Systems
WEBCAST: Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.
Posted: 12 Feb 2020 | Premiered: Feb 12, 2020

Help/Systems

Meeting Compliance Requirements with GoAnywhere
sponsored by Help/Systems
WEBCAST: In this on-demand webinar, you will find everything you need to know from the basics of compliance, non-compliance costs, penalties, and fines of several regulations such as PCI DSS, GDPR, HIPAA, FISMA, and more. View now to see how GoAnywhere Security Managed File Transfer can help.
Posted: 11 Feb 2020 | Premiered: Feb 11, 2020

Help/Systems

Cryptomining - Malicious Cryptominers are Eying Your Resources
sponsored by Cisco Umbrella
EBOOK: Cryptomining is a growing security threat, allowing cybercriminals profit at your organization’s expense. Organizations in the US are key targets, making up roughly 62% of global attacks. In this white paper, find out who they’re targeting and how to protect your network.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Cisco Umbrella

Cisco - From Privacy to Profit: Achieving Positive Returns on Privacy Investments
sponsored by Cisco Umbrella
WHITE PAPER: Privacy has become a critical business imperative, with organizations seeing significant ROI due to improvements in privacy and operational efficiency. Download this year’s Cisco Data Privacy Benchmark Study to take a closer look at the key findings around the benefits of data privacy.
Posted: 07 Feb 2020 | Published: 31 Jan 2020

Cisco Umbrella

GRC Continuous Monitoring and Configuration for Compliance
sponsored by ServiceNow
DATA SHEET: Learn how you can quickly respond to configuration issues based on the risk they present to your business with Continuous Monitoring from ServiceNow.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

ServiceNow

L.A. Tourism and Convention Board
sponsored by Absolute Software Corporation
CASE STUDY: As a non-profit organization, LA Tourism’s IT team is under tremendous pressure to ensure security while remaining efficient with limited resources. Download this case study and follow LA Tourism’s journey as they partner with Absolute to establish a security strategy that improved compliance and network visibility.
Posted: 07 Feb 2020 | Published: 06 May 2019

Absolute Software Corporation

Acquire Companies, Not Tax Headaches
sponsored by Avalara
WHITE PAPER: Mergers and acquisitions are key strategies in business growth, but from an operational standpoint, they can present challenges—especially if you’re merging a mission-critical system like an ERP. Download this white paper for tips on how to successfully integrate ERP systems after a merger.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Avalara

Taking Your Business in a New Direction
sponsored by Avalara
WHITE PAPER: Download this paper to explore how shifting products and sales channels can impact tax compliance — as well as best practices to successfully navigate these changeswhile minimizing risk.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Avalara

Denver Simplifies and Accelerates Vendor Risk Management with ServiceNow
sponsored by ServiceNow
CASE STUDY: For the city and county of Denver, information security is critical. The organization deals with many different types of sensitive information, including the personal data of its citizens. This case study reveals how ServiceNow was able to simplify its vendor experience with a risk survey portal, automated backend processes, and much more.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

ServiceNow

Digital Communication Governance in Banking and Financial Services
sponsored by Hitachi Vantara
WHITE PAPER: Read this Forbes insights white paper to explore the importance of developing a sound communication governance strategy that simultaneously enables fluid information exchange and strong security and the benefits and challenges associated with modern communications systems.
Posted: 05 Feb 2020 | Published: 27 Feb 2018

Hitachi Vantara

Zoom Customer Testimonial: Moffitt Cancer Center
sponsored by Zoom Video Communications
WEBCAST: Moffitt Cancer Center’s mission is simple: contribute to the prevention and cure of cancer. Whether it’s Zoom Meetings or Zoom Rooms or Zoom-enabled operating rooms, Moffitt uses Zoom as its communications backbone to enable doctors, nurses, specialists, and labs to easily collaborate. Watch this short video to learn more.
Posted: 05 Feb 2020 | Premiered: Nov 21, 2019

Zoom Video Communications

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

What is the CCPA & How Will it Affect Email Security?
sponsored by Egress Software Technologies Inc
VIDEO: This video explains the the significance and implications of California’s new data privacy regulations, specifically focusing on how they will affect email use among employees. Watch now to learn more.
Posted: 04 Feb 2020 | Premiered: 08 Nov 2019

Egress Software Technologies Inc

Efinity: A Case Study
sponsored by CloudLinux
CASE STUDY: Efinity deals with a lot of personal data and in the light of recent data breaches, they kept getting compliance questions from their customers: did they have the SOC 2 certification? Learn how KernelCare allowed them to become fully compliant and enabled them to prove to their customers that they can be trusted with their data.
Posted: 30 Jan 2020 | Published: 30 Jan 2020


CCPA compliance guide for email
sponsored by Egress Software Technologies Inc
WHITE PAPER: 2020 marks the initiation of the United States’ first data privacy law – the CCPA. How has your organization prepared? Download this white paper to uncover the 3-phase approach to compliance and recommended tactics related to email security & file sharing.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Egress Software Technologies Inc

Egress Risk-Based Protection
sponsored by Egress Software Technologies Inc
DATA SHEET: In this data sheet, discover the benefits and key capabilities of Egress Risk-based Protection and how it can help your organization share sensitive data with confidence.
Posted: 29 Jan 2020 | Published: 29 Jan 2020

Egress Software Technologies Inc
1 - 25 of 540 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info