Compliance PlansWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance Plans returned the following results.
RSS What is RSS?
Related Categories

 •   Patch Management
 •   Network Security
 •   Data Security
 •   Mobile Device Management
 •   Security Policies
 •   Voice Logging and Quality Assurance Recording
 •   Health and Safety
 •   Network Management
 •   Change and Configuration Management
 •   Security Monitoring

Related Searches
 •   All Compliance Plans
 •   Compliance Plans File
 •   Compliance Plans Forms
 •   Compliance Plans Improve
 •   Compliance Plans Processing
 •   Compliance Plans Standard
 •   Compliance Schedule
 •   Implementing Compliance Plans
 •   Suite Compliance Plans
 •   Web-Based Compliance Plans
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Total Quality Assurance for Businesses with a Global Business Plan by IFS

February 18, 2013 - (Free Research)
Establishing a business that is competitive on a global spectrum can be challenging. View this white paper to learn more about how you can deploy a complete quality assurance package that provides the support your business needs. It outlines what you should be looking for in a source so you can be certain you've made the right selection. 
(WHITE PAPER) READ ABSTRACT |

Top considerations for manufacturing compliance software by Epicor Software Corporation

November 08, 2012 - (Free Research)
This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company. 
(EGUIDE) READ ABSTRACT |

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network by nCircle

August 02, 2010 - (Free Research)
This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact. 
(WHITE PAPER) READ ABSTRACT |

Change is the Enemy of Security and Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network by nCircle

March 02, 2009 - (Free Research)
Read this white paper to learn 10 ways that enterprise environments typically change and what you can do to identify, analyze and manage these changes and their associated risks on an ongoing basis. 
(WHITE PAPER) READ ABSTRACT |

Disaster recovery planning for health care data and HIPAA compliance regulations by Iron Mountain

July 27, 2012 - (Free Research)
This E-Guide highlights the importance of disaster recovery to today's health care organizations. Read now to uncover essential steps for implementing a DRP in a health care setting, ensuring HIPAA compliance and the protection of electronic health records. 
(EGUIDE) READ ABSTRACT |

Disaster recovery planning for HIPAA compliance by HP & Intel®

September 19, 2011 - (Free Research)
The HIPAA Security Rule requires all HIPAA covered entities to create a plan for first protecting and then restoring confidential patient data in the event of a disaster. Unfortunately, HIPAA does not say much about what should go into such a disaster recovery plan. Inside this e-guide, find tips for a compliant disaster recovery plan. 
(EGUIDE) READ ABSTRACT |

Virtualization Security: Achieving Compliance for the Virtual Infrastructure by Trend Micro

December 01, 2009 - (Free Research)
What’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. Read this paper to learn about top trends in virtualization security, how virtualization poses unique challenges to compliance, and more! 
(WHITE PAPER) READ ABSTRACT |

IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs by Lumension

May 11, 2009 - (Free Research)
This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management. 
(ANALYST REPORT) READ ABSTRACT |

American Recovery and Reinvestment Act: How the Pioneers Plan to meet Reporting and Compliance Mandates by SAP

November 19, 2009 - (Free Research)
The ARRA was enacted to jumpstart the US economy and drive it out of the recession. One of the requirements of the recovery act is that organizations that receive funds for projects must report on the outcomes of those projects. Read on to learn what these executives and managers plan to do to meet the reporting and compliance mandates. 
(ANALYST REPORT) READ ABSTRACT |

Protecting SharePoint Data Long Term by Varonis

July 30, 2009 - (Free Research)
This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help. 
(WHITE PAPER) READ ABSTRACT |

Planning for virtualized disaster recovery in a health care setting by Dell Compellent

June 24, 2011 - (Free Research)
Server virtualization has proved to be an advantageous in disaster recovery situations because if physical servers have been destroyed, it’s easy to restore backups to virtual hardware. Learn how healthcare facilities can benefit from adding server virtualization to disaster recovery plans, while maintaining compliance. 
(EGUIDE) READ ABSTRACT |

E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.com

April 20, 2009 - (Free Research)
Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well. 
(EBOOK) READ ABSTRACT |

Configuration Auditing – The Next Critical Step in Compliance by nCircle

August 02, 2010 - (Free Research)
In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly. 
(WHITE PAPER) READ ABSTRACT |

Meeting Compliance Objectives in SharePoint® by AvePoint, Inc.

February 01, 2009 - (Free Research)
This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs. 
(WHITE PAPER) READ ABSTRACT |

End-to-End Enterprise Compliance, Provisioning and Role Enforcement: With Sun Java™ System Identity Manager and SAP GRC Access Control by Sun Microsystems, Inc.

July 2008 - (Free Research)
This white paper describes how a complete end-to-end IAM solution can be configured after exploiting the benefits of the integrated product stack. 
(WHITE PAPER) READ ABSTRACT |

Symantec IT Compliance Solution by Symantec Corporation

March 2009 - (Free Research)
Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more. 
(ARTICLE)

Governance, Risk, Compliance: Policy Management Methods and Tools by Symantec Corporation

December 2009 - (Free Research)
IT managers are looking to governance structures and the discipline of risk management to help them make decisions and create sustainable processes around regulatory compliance. Read this E-book to learn more about risk management and evaluating GRC solutions. 
(EBOOK) READ ABSTRACT |

Leveraging a Maturity Model to Achieve “Proactive Compliance” by Symantec Corporation

August 2009 - (Free Research)
Read this paper to learn about a new approach to compliance that seeks to move beyond the short-term goal of passing an audit and to incorporate compliance into an organization's operations in a more proactive sense utilizing the Capability Maturity Model. 
(WHITE PAPER) READ ABSTRACT |

Bridging the Gap: Security, Operations & Compliance by eIQnetworks

February 2009 - (Free Research)
Read this white paper to see why SecureVue delivers the most cost effective and comprehensive technical solution on the market today to manage security, operations and compliance requirements. 
(WHITE PAPER) READ ABSTRACT |

FlexNet Manager Suite for Enterprises: Complete Desktop-to-Datacenter Enterprise License Optimization Solution by Flexera Software

March 2011 - (Free Research)
Lacking a strategic solution for Enterprise License Optimization most organizations are greatly overspending on some licenses and out of compliance on others, putting them at risk of costly software license audits. FlexNet Manager Suite is a comprehensive and proven solution for Enterprise License Optimization and license compliance management. 
(WHITE PAPER) READ ABSTRACT |

eBook: Compliance for the Midmarket: Governance, Risk and Technology by SearchCIO.com

June 2009 - (Free Research)
Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ 
(EBOOK) READ ABSTRACT |

LogRhythm and NERC CIP Compliance by LogRhythm, Inc.

July 2008 - (Free Research)
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements. 
(WHITE PAPER) READ ABSTRACT |

Automation Suite for NERC CIP Compliance by LogRhythm, Inc.

March 2013 - (Free Research)
Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Strengthening Governance, Risk, and Compliance in the Banking Industry by SAP America, Inc.

January 2011 - (Free Research)
Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. Read this report to learn more. (Economist Intelligence Unit, 2009) 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts