Materials Compliance Management SolutionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Business SolutionsFacilities ManagementMaterials Compliance Management Solutions  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 106 | Next Page

Web Security Gateway: Web 2.0 Secured and Simplified by Websense, Inc.

January 13, 2011 - (Free Research)
The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform. 
(WHITE PAPER) READ ABSTRACT |

IT Executive Guide to Security Intelligence by IBM

February 24, 2011 - (Free Research)
In this white paper, you will learn how security intelligence addresses these shortcomings and empowers organizations from Fortune Five companies to mid-sized enterprises to government agencies to maintain comprehensive and cost-effective information security. 
(WHITE PAPER) READ ABSTRACT |

Email Compliance Rules for Government and Education: E-Discovery, Records Retention, and Email Management Policies & Best Practices by SearchSecurity.com

July 26, 2011 - (Free Research)
This white paper explores the best practices for public sector decision-makers who play a role in email management, e-discovery, email retention, and email compliance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous by Iron Mountain

May 31, 2013 - (Free Research)
This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy. 
(WHITE PAPER) READ ABSTRACT |

Overcoming the Modern Challenges to Corporate Records Management by Iron Mountain

August 30, 2012 - (Free Research)
In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends. 
(PODCAST) READ ABSTRACT |

Survive the Scrutiny of Litigation:Rediscover Records Management by Iron Mountain

August 27, 2012 - (Free Research)
Having a modern records management system can give you the peace of mind you need and save you enormous headaches and revenue losses in the event of an audit. This comprehensive E-Guide explores today's best practices for records management. 
(EBOOK) READ ABSTRACT |

Packaging tips to safeguard your physical records by Iron Mountain

March 13, 2012 - (Free Research)
Read this white paper to learn proper techniques and best practices for packaging and storing your physical documents and information in cartons to avoid risk and records exposure. Find tips on what to look for in a quality carton, how to know when your carton is too old and needs to be replaced, and how to properly pack your carton. 
(DATA SHEET) READ ABSTRACT |

Database Security: Audit and Protect Critical Databases by Imperva

September 07, 2010 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

EMA Analyst Report on the Mobile Device Management Marketspace by IBM

August 24, 2012 - (Free Research)
Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 18, 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 03, 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Red Flag Rules Compliance by Gemalto

September 09, 2010 - (Free Research)
SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims. 
(EBOOK) READ ABSTRACT |

Enterprise Security: Why you need Effective Log Management by SearchCompliance.com

April 23, 2013 - (Free Research)
For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance. 
(EBOOK) READ ABSTRACT |

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa by SearchCompliance.com

February 05, 2010 - (Free Research)
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards. 
(EBOOK) READ ABSTRACT |

Using Predictive Coding to Your E-Discovery Advantage by SearchCIO.com

May 23, 2013 - (Free Research)
E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes. 
(EZINE) READ ABSTRACT |

Virtual Data Center E-Zine - Volume 24: Strategies to Manage Virtual Data Center Growth by SearchDataCenter.com

July 07, 2010 - (Free Research)
Read this paper to learn how virtualization has been hyped as the answer for data center growth. And while consolidation can solve some of the challenges associated with running more workloads. 
(EZINE)

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic” by Information Security Magazine

March 04, 2011 - (Free Research)
This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology. 
(EZINE)

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

July 24, 2012 - (Free Research)
This informative resource demonstrates how organizations can find a SIEM solution and achieve key goals. Other topics explained in this white paper include; understanding the capabilities of SIEM technologies and potential use cases. 
(WHITE PAPER) READ ABSTRACT |

Keys to the Kingdom: Monitoring Privileged user actions for security and compliance by LogRhythm, Inc.

March 06, 2012 - (Free Research)
This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts. 
(WHITE PAPER) READ ABSTRACT |

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World by Black Duck Software

July 2008 - (Free Research)
Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards® by Advent Software, Inc

April 2010 - (Free Research)
Whether you are just starting a compliance program or need to fine-tune your existing process, this document will help you understand the steps involved in becoming GIPS compliant. It is not a substitute for the Standards themselves. It is designed to help you understand the value of compliance, what’s needed to achieve it, pitfalls to avoid. 
(WHITE PAPER)

FlexNet and FDA 21 CFR Part 11 by Apriso Corporation

March 2011 - (Free Research)
Manufacturers regulated by the FDA 21 CFR Part 11 regulations understand that the integrity of manufacturing processes must be achieved and maintained in order to sustain compliance. The purpose of this document is to demonstrate that Apriso FlexNet platform and application suite can support the intent of the 21 CFR Part 11 regulatory guidelines. 
(WHITE PAPER) READ ABSTRACT |

Healthcare and Compliance - The New Reality by Juniper Networks, Inc.

April 2011 - (Free Research)
This paper outlines the three most important mandates for Healthcare today. 
(WHITE PAPER) READ ABSTRACT |

Enabling Compliance with the PCI Data Security Standards by Vormetric

January 2007 - (Free Research)
Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing. 
(WHITE PAPER) READ ABSTRACT |

Planning for Disaster Recovery in a Health Care Setting by Dell Compellent

August 2011 - (Free Research)
This Eguide will help health care providers create and implement an effective disaster recovery plan. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 106 | Next Page

> Explore alternative searches for: Materials Compliance Management Solutions

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts