Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed   
Compliance Best Practices Reports
1 - 25 of 558 Matches Previous Page  |  Next Page
Secure Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Protect Your Business-Critical Applications in the Cloud
sponsored by Onapsis
PRODUCT OVERVIEW: Moving your business-critical applications to the cloud has many benefits including cost savings and agility. However, you need visibility and insights into your cloud environment to ensure security and compliance. In this brief, learn how Onapsis can help your organization prepare for potential cyberattacks, compliance audits, and more.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Top 10 Reasons Customers Choose Proofpoint to Protect Office365
sponsored by Proofpoint
RESOURCE: For organizations migrating to the cloud, Microsoft Office 365 is a whole new way of working—one that requires a whole new approach to security and compliance. Dive into this infographic to discover the top 10 reasons customers may be choosing Proofpoint to protect Office 365.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Proofpoint

Armorblox NLU Platform
sponsored by Armorblox
PRODUCT OVERVIEW: Using natural language understanding (NLU), deep learning, analytics, automation, and distributed remediation, Armorblox can help defend your organization against business email compromise attacks, prevent data leaks, and inject integrity into your business workflows. In this solution brief, explore key features of the Armorblox NLU Platform.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Case Study - Schiavello
sponsored by M-Files
CASE STUDY: Dive into this case study to discover how Schiavello uses M-Files to manage compliance more effectively.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

M-Files

The 2019 Identity Report
sponsored by SailPoint Technologies
ANALYST REPORT: Today's business world is constantly evolving, bringing new opportunities as well as new risks. In this research report, discover key findings from SailPoint's evaluation of IT leaders including 3 key identity-related challenges that face enterprises today.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

SailPoint Technologies

Security, Compliance & ERP
sponsored by SAP
VIDEO: In this comprehensive webinar, explore key issues and trends impacting security and compliance within ERP systems. Learn about the importance of incorporating a strong role mapping security profile framework during your ERP deployment, and review other essential tips for improving security and compliance within your organization.
Posted: 20 Aug 2019 | Premiered: 20 Aug 2019

SAP

How OneTrust Helps with the California Consumer Privacy Act (CCPA)
sponsored by OneTrust
WHITE PAPER: The California Consumer Privacy Act (CCPA) will take effect on January 1, 2020. Organizations that conduct business in California now need a scalable way to discover what data they hold, how it is used, and what third parties have access to it. Learn how with OneTrust, your organization can take a holistic approach to CCPA compliance.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

OneTrust

How IT Administrators Are Tackling Active Directory and Security
sponsored by Zoho
RESOURCE: ManageEngine conducted a global survey to identify the various Active Directory (AD) and IT security issues admins face – and the results were shocking. The stats ManageEngine saw broke certain assumptions they held about how admins went about tackling various issues. In this infographic, explore the stats.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Zoho

15 Ways to Weed the Regulatory Violations Out of Your Spend
sponsored by AppZen
EBOOK: You may have a best-in-class system for approving expenses and accounts payable, but if you're not doing a thorough audit of all spend prior to disbursement, you likely have regulatory violations lurking in there. Download this e-book for a checklist on 15 ways to identify spend-related regulatory violations.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

AppZen

Improve Your Relationship with Data
sponsored by Virtru
EBOOK: No matter where you are in your cloud journey, there's still time to improve your relationship with your data. Becoming familiar with your data and knowing all the places it resides is a great place to start. Discover how to improve your relationship with data by building a compliance readiness plan today.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Virtru

Enterprise Governance, Risk, and Compliance for PeopleSoft
sponsored by Appsian
WHITE PAPER: In this white paper, discover the fundamental parameters necessary to develop an effective security strategy to manage modern threat vectors and navigate complex compliance regulations. Also, explore GRC challenges unique to PeopleSoft and how Appsian Security Platform can enhance security to meet today's compliance requirements.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

GDPR & PeopleSoft: Essentials for Compliance
sponsored by Appsian
WHITE PAPER: Your PeopleSoft applications are the core of your business. Critical PII are housed on hundreds of pages – making them a significant factor in your GDPR compliance strategy. In this white paper, learn about the challenges organizations face when establishing GDPR compliance in PeopleSoft applications.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Appsian

LANDBANK Increases Agility and Competitiveness at Lower Risk with Informatica
sponsored by Informatica
CASE STUDY: Read this case study to learn how you can make use of a scalable data store that reduces risk, enhances decision support, strengthens customer relationships, and more.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Informatica

Accelerate ERP Threat Detection
sponsored by Appsian
WHITE PAPER: Your ERP applications house your organization's most sensitive data, making them a tempting target for cyber-attacks. This calls for improved threat detection and remediation features in your security infrastructure. In this white paper, learn how Appsian's Real-Time Analytics solution can help your organization prevent ERP data breaches.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian

Prisma: Cloud Governance & Compliance
sponsored by Palo Alto Networks
RESOURCE: Ensuring your cloud resources and SaaS applications are correctly configured, properly protected and compliant is essential to prevent successful attacks. In this resource, explore everything you need to know to ensure governance and compliance. Also, learn how Prisma's cloud security offering can help your organization.
Posted: 12 Aug 2019 | Published: 24 May 2019

Palo Alto Networks

BrickStor Encryption & Key Management Capabilities
sponsored by RackTop Systems
DATA SHEET: Download this datasheet to learn about BrickStor, a CyberConverged solution with advanced encryption and key management capabilities that automatically protect your data and ensure continuous compliance without corruption.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

RackTop Systems

What is HIPAA Compliance And Why Your HDO Business Should Care
sponsored by Crowd Machine
RESOURCE: Read this white paper to learn how CIOs can engage and protect the broad health ecosystem in a way that complies with the demands of HIPAA, while still maintaining efficient data accessibility.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Crowd Machine

Key Considerations for Compliance in the Cloud
sponsored by Virtru
RESOURCE: Data is the mission-critical information that keeps your business running. So it should come as no surprise that organizations are regularly targeted by cybercriminals in an effort to steal data. In this infographic, learn how Virtu's encryption and access management solution ensures data security in the cloud, and facilitates compliance in 4 ways.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

The Simple Guide to Encryption Key Management
sponsored by Virtru
WHITE PAPER: In today's world, interactions are increasingly happening online which pose security risks when you need to share sensitive data, including encryption keys. In this white paper, learn about the different components of encryption key management, so that you know the right questions to ask when evaluating new and existing encryption technologies.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Virtru

Sydney Opera House Case Study
sponsored by Blackberry Cylance
CASE STUDY: The Sydney Opera House embarked on a renewal process which included updating their endpoint security system. They were looking for a solution that could help address a number of challenges including cyberattacks and compliance. Download this case study to learn why they choose to deploy CylancePROTECT.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Blackberry Cylance

Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
sponsored by Forcepoint
WEBCAST: Some approaches to information security simply won't deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy. In this webcast, Doug Landoll discusses how to take a risk-first approach to addressing information security.
Posted: 07 Aug 2019 | Premiered: Aug 7, 2019

Forcepoint

Supplementing the Limitations in Office 365
sponsored by Forcepoint
ANALYST REPORT: This Osterman Research report explores how you can use the native capabilities Office 365 provides as a starting point for your data protection strategy, and how you can implement a 3rd party service to help ensure all of your data is backed-up and recoverable.
Posted: 06 Aug 2019 | Published: 31 Mar 2018

Forcepoint

Privacy by Design: The Key to Unlock Your Compliance Strategy
sponsored by Immuta, Inc
WHITE PAPER: Privacy by Design (PbD), and its EU version Data Protection by Design (DPbD), aim to implement privacy controls from the outset. In this white paper, explore the beginnings of a framework for operationalizing PbD.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Immuta, Inc

The Difference Between Format-Preserving Encryption and Tokenization
sponsored by Comforte AG
RESOURCE: Format-preserving encryption (FPE) and tokenization have similar objectives, but the difference between the 2 can be confusing at times. Download this resource for a brief overview of both the similarities and differences between these 2 data-centric security methods. Also, explore examples of when 1 method might be used instead of the other.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Comforte AG
1 - 25 of 558 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement