Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed   
Compliance Best Practices Reports
1 - 25 of 640 Matches Previous Page  |  Next Page
Australian Companies Leaving Themselves Exposed on Security and Compliance
sponsored by Mimecast
RESEARCH CONTENT: Uncover the shocking survey results that 193 CIOs and IT Managers answered regarding compliance, regulations, and organizational priorities of security and security staff training.
Posted: 16 Aug 2018 | Published: 16 Aug 2018


Strengthening Your Security with SecureDoc
sponsored by WinMagic
WEBCAST: Watch this short video to learn about protecting your assets with SecureDoc, which can help strengthen your organization's security and remain compliant.
Posted: 15 Aug 2018 | Premiered: Aug 15, 2018


The Two Tribes of Marketing: GDPR has Created a Cultural Split in Marketing - Only one side can win...
sponsored by Marketo
ANALYST REPORT: 55% of businesses are marketing first, using GDPR compliance as an opportunity to improve customer engagement. In this report, take an in-depth look at the legal-first and marketing-first culture split and the importance of customer sentiment to how businesses use data.
Posted: 15 Aug 2018 | Published: 15 Aug 2018


Making BitLocker Simple, Smart and Secure for You
sponsored by WinMagic
WHITE PAPER: Microsoft BitLocker already offers data protection capabilities like high-performance, built-in OS encryption, integration with Microsoft Azure and more, but learn of the potential opportunities and benefits that come with adding an additional encryption tool to BitLocker.
Posted: 14 Aug 2018 | Published: 14 Aug 2018


Security and Compliance in the Cloud
sponsored by DXC Concerto
WHITE PAPER: With proper safeguards in place, business leaders can put their focus on building the business and growing profits. In this white paper, discover 7 lessons on security for you to apply so that you can be proactive and thorough with your approach to data protection.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

DXC Concerto

Guide to PCI Compliance for Containers
sponsored by Twistlock, Inc.
RESOURCE: Explore this guide to learn how your containers can be brought into compliance with the PCI DSS in your cardholder data environment.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Top 7 Office 365 Security Use Cases for a CASB
sponsored by McAfee, Inc.
RESOURCE: In this 67-page resource, you'll uncover 7 Microsoft Office 365 use cases for CASB to help consolidate security and compliance capabilities to keep your data safe and secure.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

McAfee, Inc.

What's the Difference Between Photo Screening and Visual Acuity Measurement?
sponsored by Welch Allyn
RESEARCH CONTENT: This research study compares the use of instrument-based screening and visual acuity screening for detecting vision problems in children, and whether the instrument-based screening provides time savings for schools. See the conclusion inside.
Posted: 06 Aug 2018 | Published: 06 Aug 2018

Welch Allyn

An Inside Look at Big Data Architecture
sponsored by Imanis Data
WHITE PAPER: Big data keeps getting bigger. At first, big data was primarily used for research or proof-of-concept projects, but as more organizations integrate it with everyday operations, the challenge is how to protect it. Download this report to learn how you can create secure data architecture for your big data.
Posted: 06 Aug 2018 | Published: 06 Aug 2018

Imanis Data

Transform Your IT Security in 3 Steps
sponsored by VMware
WHITE PAPER: Security is critical; it should be on the mind of every business, and it should never be sacrificed at the expense of some other endeavor. Download this white paper to unveil 3 focus areas for transforming your IT security into a reliable workhorse for the digital workspace.
Posted: 31 Jul 2018 | Published: 31 Dec 2017


Cybersecurity Compliance: Guide to Data Protection Regulatory Compliance
sponsored by Panda Security
WHITE PAPER: Violation of GDPR and PCI DSS could cause a lot of damage to your organization--ranging from hefty fines to a loss of confidence from customers, contractors and employees. Learn about Panda Security's advanced cybersecurity platform and managed services, which are designed to protect your data and maintain compliance.
Posted: 31 Jul 2018 | Published: 31 Jul 2018

Panda Security

Your Guide to Integrated Risk Management Vendors
sponsored by ServiceNow
RESEARCH CONTENT: In this Gartner Magic Quadrant report for security and risk management leaders, get a breakdown of the current field of integrated risk management tools and find out which platforms offer the capabilities you need to secure your enterprise and improve compliance.
Posted: 30 Jul 2018 | Published: 16 Jul 2018


Secure Collaboration that Teams Love Using
sponsored by Dropbox
VIDEO: Collaboration tools are essential to your organization, and you're constantly using them to share important documents, but how secure are they? Download this webcast to learn about Dropbox, and how the collaboration tool can encourage teamwork while complying with security requirements.
Posted: 27 Jul 2018 | Premiered: 24 Jul 2018


Webinar: Solving Security and Compliance Challenges with Confidential Information Discovery
sponsored by Hyland
WEBCAST: When sensitive data ends up in unintended places, it creates security and compliance risks for the organization. Watch this webinar to learn how a confidential information discovery tool can help keep your organization secure.
Posted: 26 Jul 2018 | Premiered: Jul 26, 2018


Information Privacy and Security: GDPR is Just the Tip of the Iceberg
sponsored by Hyland
RESEARCH CONTENT: Are you ready for GDPR and the requirements it introduces for information security, governance and privacy?
Posted: 26 Jul 2018 | Published: 31 Dec 2017


GDPR is Here: Are You Ready?
sponsored by Oracle Cloud
VIDEO: In this webcast, hear from Allesandro Vallega, Security & GDPR business development director at Oracle EMEA about survey results, maturity categories across industries, and cloud services that can help achieve GDPR compliance.
Posted: 26 Jul 2018 | Premiered: 24 Jul 2018

Oracle Cloud

5 Key Steps for GDPR Compliance
sponsored by Plixer
RESOURCE: Discover 5 steps to help your organization get into compliance for GDPR so that you can protect your business from steep fines and potential threats.
Posted: 11 Jul 2018 | Published: 02 Jul 2018

Keeping SIEM Simple and Actionable
sponsored by Fortinet, Inc.
WEBCAST: Security information and event management (SIEM) tools can be extremely effective for managing security, performance and compliance. However, SIEMs can often be too complex to be used effectively. Listen in on the webcast to learn how to keep your SIEM simple and actionable
Posted: 03 Jul 2018 | Premiered: Jul 3, 2018

Fortinet, Inc.

GDPR: Information Security, Governance and Regulations Working in Unity
sponsored by CA Technologies
ANALYST REPORT: What is data privacy if not data security? Organizations must focus more on data security now that new GDPR regulations are in effect. In this insight report, learn how information governance and IT professionals come together with security software to establish a foundation for GDPR compliance.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

GDPR Readiness Starts With the Mainframe: Here's Why
sponsored by CA Technologies
WHITE PAPER: How do you evaluate your GDPR readiness? Download to learn why mainframe teams should be a part of GDPR planning and discover 10 questions your security practitioners should ask to evaluate current GDPR readiness.
Posted: 02 Jul 2018 | Published: 02 Jul 2018

CA Technologies

A Short Primer of GDPR Essentials
sponsored by Splunk
RESOURCE: Don't allow new GDPR regulations to spring fines on your business. Download this resource to access a primer of information regarding GDPR, including financial implications, key focus areas, and more.
Posted: 29 Jun 2018 | Published: 29 Jun 2018


A Layman's Guide on How to Operate Your SIEM Under GDPR
sponsored by Splunk
RESOURCE: GDPR is now in effect – and your business needs to think about how that affects the machine data you're collecting. Explore the risks of a log file data breaches, and discover how a SIEM platform can help your business mitigate risk around log files.
Posted: 28 Jun 2018 | Published: 31 Dec 2017


Privacy and Online Data: Can We Have Both?
sponsored by Actian Corporation
WHITE PAPER: Those who store, aggregate and transfer data are all subject to the new provisions and regulations of GDPR – and that affects databases and data analysis. Read this white paper to learn how GDPR applies to you and discover how databases and analytics must adapt to satisfy the new regulation requirements.
Posted: 28 Jun 2018 | Published: 28 Jun 2018

Actian Corporation

The Impact of GDPR Even if You're Not in the EU
sponsored by Fortinet, Inc.
WEBCAST: Listen in on this informative webcast to learn more about what GDPR compliance means for organizations not located in the EU and how network security technologies come into play with GDPR.
Posted: 26 Jun 2018 | Premiered: Jun 26, 2018

Fortinet, Inc.

Achieving Continuous Compliance with CTP and AWS
sponsored by Amazon Web Services
VIDEO: Compliance in the cloud is different than on-premise, particularly for financial services organizations. Learn how your enterprise can improve the visibility of all compliance requirements across the business and its applications.
Posted: 17 Jul 2018 | Premiered: 31 Oct 2017

Amazon Web Services
1 - 25 of 640 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement