Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed   
Compliance Best Practices Reports
1 - 25 of 593 Matches Previous Page  |  Next Page
Castle Ventures Case Study
sponsored by Siemplify
CASE STUDY: Like most companies providing managed security services, Castle Ventures manages a variety of disparate technologies for its clients. In this case study, explore how Castle Ventures was able to address their overwhelming workload to streamline alerts, manage client security stacks and provide compliance reporting.
Posted: 12 Dec 2019 | Published: 12 Dec 2019

Siemplify

HIPAA Compliance: A Rx for MSP Business Growth
sponsored by RapidFire
WHITE PAPER: Read the following e-book to view the benefits of building a robust and potent HIPAA compliance service offering in order to protect your customers and their clients, and the return on investment of doing so in your enterprise.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

RapidFire

Implementing General Data Protection Regulation in SAP Environments
sponsored by Attunity
WHITE PAPER: Although GDPR has been in effect since May 2018, many organizations are left with questions concerning their degree of compliance and exposure to risk – especially in mission-critical environments like SAP. If you’re running SAP, download this white paper to explore what data might be at risk and how to implement and maintain compliance policies.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

Attunity

The Million-Dollar Opportunity: Compliance for Cyber Liability Insurance
sponsored by RapidFire
WHITE PAPER: To get an edge on securing clients against risking both security and payouts, read this white paper. It outlines the benefits of MSPs investing in compliance solutions to both protect their customers and grow their revenue, as well as 5 ways to help customers stay compliant.
Posted: 03 Dec 2019 | Published: 03 Dec 2019

RapidFire

The Financial Adviser's Guide to Compliant IM and Collaboration
sponsored by Smarsh
WHITE PAPER: The rise of collaboration platforms and the compliance requirements they bring with them are a symptom of a larger reality: Workplace communications are changing. Read on to learn how you add IM and collaboration platforms to a compliant ecosystem in your organization.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

Blueprint for PCI Compliance with Network Detective
sponsored by RapidFire
WHITE PAPER: The most common misconception is that PCI compliance means only having to pass a certified external vulnerability scan, when, in reality, there are 12 major segments an organization must address. This white paper provides a blueprint so MSPs can help ensure their clients achieve, and retain, compliance on a continual basis.
Posted: 02 Dec 2019 | Published: 31 Dec 2017

RapidFire

Beginner's Guide to Employee Monitoring
sponsored by ActivTrak
WHITE PAPER: On the surface, employee monitoring systems might seem like a fancy way to babysit employees. However, this technology stands as a far more valuable tool than people give it credit for. In this white paper, learn about several security benefits of employee monitoring systems.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

ActivTrak

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Electronic Communications Compliance Survey Report
sponsored by Smarsh
ANALYST REPORT: Regulatory oversight is growing more sophisticated as the communications technology landscape continues to evolve. In this 2019 research report, Smarsh revels key findings from a survey of financial services professionals responsible for the retention, archiving, and oversight of electronic communications.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

The Log Management and Monitoring Buyer’s Guide
sponsored by SolarWinds, Inc.
RESOURCE: The process of deploying a software for monitoring, managing, and analyzing logs can seem quite daunting. In this resource, uncover the major elements of a good log monitoring and management strategy. Also, find a checklist to help you build your strategy and choose a vendor.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

SolarWinds, Inc.

Data Privacy Is the New Strategic Priority
sponsored by IBM
WHITE PAPER: Recently, Forrester conducted research, in partnership with IBM to evaluate enterprises’ data privacy compliance with increasing regulatory requirements. Read on to uncover the key insights from the research.
Posted: 22 Nov 2019 | Published: 31 Jul 2019

IBM

The Top 4 Myths of Policy Compliance
sponsored by FireMon
WHITE PAPER: This white paper highlights the necessary steps to improve your security posture, achieve continuous compliance, and gain real-time visibility and control to protect your hybrid environments.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

FireMon

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 19 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

How to Address Privacy Regulations and Keep Your Data Safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

ComputerWeekly.com

The Quick Guide to Payroll Compliance
sponsored by Mindshare - Sage
EGUIDE: How are you keeping up with the ever-changing compliance factors impacting the payroll function? This guide looks at frequent compliance challenges as reported by payroll experts, and offers best practices and solutions to help your payroll function run smoothly and confidently.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Mindshare - Sage

Client Insights on Data Protection with IBM Security Guardium
sponsored by IBM
ANALYST REPORT: How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.
Posted: 13 Nov 2019 | Published: 31 Aug 2019

IBM

Executive Summary 2019 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Thales

Scaling Your Data Privacy Program
sponsored by Ionic Security
RESOURCE: When building out a privacy program, businesses need to consider the relationship between security, privacy and compliance. Organizations should look to strike a balance in order to meet regulatory requirements and customer perception at scale. How does your organization tackle privacy? In this guide, uncover some industry best practices.
Posted: 04 Nov 2019 | Published: 25 Oct 2019

Ionic Security

Who’s Stalking Mobile App Users?
sponsored by The Media Trust
WHITE PAPER: It’s difficult to disagree with the convenience of mobile applications, but have you ever considered the data being captured? Consumer awareness and regulations like GDPR & CCPA are creating a dramatic shift in app development and experience. In this report, find hidden vulnerabilities, the role of cookies & other findings.
Posted: 01 Nov 2019 | Published: 31 Oct 2019

The Media Trust

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

Best Practices for Data Privacy Programs
sponsored by Ionic Security
RESOURCE: Data Privacy – it’s on everyone’s mind. Privacy professionals are left overwhelmed. Companies don’t know where to turn. Luckily, this guide will walk you through privacy programs and how to segment and prioritize different best practices and technologies that support the scale of your business. Read on to get started.
Posted: 30 Oct 2019 | Published: 30 Oct 2019

Ionic Security

Overcome the challenges of protecting data that is here, there and everywhere
sponsored by IBM
EBOOK: When it comes to cloud environments, whether in the public cloud or a privately hosted or hybrid environment, data security and protection controls must protect sensitive data. Read this e-book to learn how data security and protection technologies should operate in multiple environments (physical, cloud and hybrid) at the same time.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

Overcome the challenges of protecting data that is here, there and everywhere
sponsored by IBM
EBOOK: When it comes to cloud environments, whether in the public cloud or a privately hosted or hybrid environment, data security and protection controls must protect sensitive data. Read this e-book to learn how data security and protection technologies should operate in multiple environments (physical, cloud and hybrid) at the same time.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

Securing Cloud environments: Five Data Encryption best practices to help reduce your risk
sponsored by IBM
WHITE PAPER: It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM
1 - 25 of 593 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement