Compliance White Papers

Results 1 - 25 of 455Sort Results By: Published Date | Title | Company Name
By: Nexgate     Published Date: Jun 17, 2015

This report will outline a framework for assigning roles and responsibilities to manage social media risk.

Tags : proofpoint, nexgate, social media risk, social media, risk management, compliance, security policies, content delivery
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: Kaseya     Published Date: May 13, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, disaster recovery
    
By: Windstream     Published Date: May 06, 2015

Read this Gartner report to learn how to keep business up and running no matter what.

Tags : business continuity, windstream, gartner, it service, analysis, compliance, disaster recovery, web service security
    
By: NAVEX Global     Published Date: Mar 18, 2015

Get the inside track on the key ethics and compliance industry trends that will impact your business in 2015—and get the resources you need to help you plan for the year ahead.

Tags : ethics and compliance, ethics trends, compliance
    
By: NAVEX Global     Published Date: Mar 18, 2015

In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.

Tags : compliance, software compliance
    
By: 123Together     Published Date: Feb 05, 2009

Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity

Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
    
By: ZirMED     Published Date: Jun 22, 2015

Read this healthcare providers' guide for expertise on effective revenue cycle management and long-term financial forecasting.

Tags : zirmed, cycle management, revnue, compliance, hippa, it spending, it budget, total cost of ownership
    
By: IBM     Published Date: Jun 16, 2015

This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.

Tags : data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures
    
By: Lumension     Published Date: Jun 03, 2015

Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.

Tags : security, patch, data, regulatory compliance, application security, compliance, intrusion prevention, database development
    
By: Acronis EMEA     Published Date: May 19, 2015

This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.

Tags : security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
    
By: Skillsoft     Published Date: Apr 27, 2015

To compete in today’s global marketplace, employees at every level of your organisation need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions - even when no one is watching.

Tags : skillsoft, conduct programme, compliance training programme, workplace, risk, compliance issues, culture of workplace, elearning
    
By: Skillsoft     Published Date: Apr 27, 2015

This paper examines five important factors to consider when designing and implementing a Health & Safety Compliance training programme.

Tags : workplace safety programme, training, safety, heatlh, heath and safety, compliance, workplace safety programme, compliance training programme
    
By: AllClearID     Published Date: Apr 23, 2015

Use this Incident Response Workbook to begin planning a well-orchestrated response in the event of a data breach. Download the workbook now.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network security, compliance, disaster recovery
    
By: Citrix Systems     Published Date: Apr 15, 2015

This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, security, migration, network architecture
    
By: IBM     Published Date: Apr 09, 2015

Hybrid cloud infrastructures and mobility are changing the rules of the game for IT security professionals. Read this paper to understand the requirements to adopting a new monitoring strategy to quickly detect attacks across the infrastructure you control in your data center, as well as what you don't control in the dynamic cloud.

Tags : ibm, hybrid cloud, cloud computing, monitoring, detection, it security, data center security, business continuity
    
By: Kaseya     Published Date: Mar 12, 2015

Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.

Tags : automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations
    
By: CDW     Published Date: Feb 24, 2015

Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.

Tags : software piracy, software vendors, audit, software licenses, software compliance, piracy misconceptions, auditing, compliance
    
By: Docusign     Published Date: Feb 19, 2015

À cause du nombre croissant de professionnels qui utilisent les téléphones et applications mobiles, la « vague mobile » a des incidences sur chaque fonction commerciale dans le monde entier et modifie la manière de faire des affaires. Les technologies telles que les signatures électroniques mobiles peuvent aider les entreprises à finaliser leurs transactions commerciales. Les signatures électroniques mobiles vous permettent, ainsi qu'à vos contacts, d'envoyer et de signer des documents légalement, grâce aux téléphones et à d'autres appareils mobiles, à tout moment et en tout lieu.

Tags : docusign, la signature electronique, compliance
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Micro Focus     Published Date: Aug 28, 2014

Enabling technologies to streamline regulatory and legislative changes.

Tags : it compliance programs, risk management, it management, data management, compliance
    
By: Micro Focus     Published Date: Aug 28, 2014

Deliver value back to the business faster than before with the Micro Focus Enterprise solution set. Micro Focus' products for IBM zEnterprise make your mainframe work even smarter. Successfully achieve rapid Time to Value of core mainframe applications, helping tackle the growing IT innovation, maintenance and compliance backlog. Faster application service delivery is achieved through technology that transforms mainframe application analysis, modernization, development, testing and workload optimization.

Tags : mainframe, core applications, it innovation, data management, compliance
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.