Compliance And AdministrationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance And Administration returned the following results.
RSS What is RSS?
Related Categories

 •   Endpoint Security
 •   Managed Security Services
 •   Application Security
 •   Security Policies
 •   Remote Administration
 •   Security Monitoring
 •   Identity Management/ User Provisioning

Related Searches
 •   Buys Compliance
 •   Compliance And Administration It
 •   Compliance And Administration Video
 •   Compliance Protocol
 •   Compliance Request
 •   Design Compliance And
 •   Skills Compliance And Administration
 •   Solution Compliance And
 •   Webcasts Compliance And
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

IBM zSecure Compliance and Administration by IBM

March 11, 2013 - (Free Research)
View this webcast to learn how you can improve collaboration with your employees and business data. Find out the key to keeping up with today's fast-paced culture and how you can ensure your data is protected no matter where your employees access the information. 
(WEBCAST) READ ABSTRACT |

The Role of Security Management in Achieving "Continuous Compliance" by CA Technologies.

December 28, 2007 - (Free Research)
There's a focus today on regulatory compliance involving financial reporting, security and data privacy. But there are also tremendous business performance opportunities that can be fueled by the new requirements. This paper details the benefits of continuous compliance, which include reduction of risk and cost. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Henderson Global Investors Bolsters Microsoft SharePoint Adoption with DocAve by AvePoint, Inc.

August 01, 2011 - (Free Research)
This case study details the efforts of Henderson Global Investors, an asset management firm, to improve their SharePoint-based content management, backup and administrative functions using AvePoint's DocAve Software Platform. 
(CASE STUDY) READ ABSTRACT |

Paperless Benefits Management Strategies Containing Costs and Complexity on a Budget by Sage Abra

March 03, 2008 - (Free Research)
This guide highlights recent trends in employee benefit costs and discusses the unique challenges faced by small and midsized businesses in the wake of escalating healthcare costs. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Accelerating Return-On-Investment with Roles Management by Oracle Corporation

February 12, 2009 - (Free Research)
This paper explains a role based access control solution that allows true automation of identity administration and compliance attestation with industry experts who have already helped other organizations. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Daily Active Directory Administration: Simplified, Streamlined - and Successful by Dell Software

October 02, 2009 - (Free Research)
In this Quest white paper, learn how automating AD improves your efficiency and reduces mistakes, helping you to break free from the headaches and the daily AD grind. Read this white paper today. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Cisco Prime LAN Management Solution 4.2. Virtual Appliance by Cisco Systems, Inc.

February 15, 2012 - (Free Research)
Download your free trial of Cisco Prime LAN Management Solution for Virtual Appliance, an integrated suite of management functions to improve the configuration, administration, monitoring, and troubleshooting of your network. 
(TRIAL SOFTWARE) READ ABSTRACT |

Client Case Study: London Borough of Brent by IBM

July 28, 2011 - (Free Research)
This paper discusses how Brent used IBM to supply the customer data integration and master data management (MDM) to consolidate back-end systems to reduce administration costs, improve customer service and minimise benefit fraud. 
(WHITE PAPER) READ ABSTRACT |

Cisco Prime LAN Management Solution (WINDOWS OS) 4.2 by Cisco Systems, Inc.

February 15, 2012 - (Free Research)
Download your free trial of Cisco Prime LAN Management Solution, an integrated suite of management functions to help you simplify the configuration, administration, monitoring, and troubleshooting of networks and technologies. 
(TRIAL SOFTWARE) READ ABSTRACT |

Network Security 2.0: A Systems Approach to Threat Mitigation Augments Defense in Depth by Cisco Systems, Inc.

May 28, 2008 - (Free Research)
In the first edition of a six part series on Network Security sponsored by Cisco Systems, security architecture is the focus. Specifically covered is a systems approach that builds on IT security investment using System Management for policy, reputation and identity. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 10, 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle by Guardium, an IBM Company

February 12, 2010 - (Free Research)
Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle. 
(DATA SHEET) READ ABSTRACT |

Critical Technologies for Compliance and Risk Management by Siperian, Inc.

February 20, 2009 - (Free Research)
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines. 
(WHITE PAPER) READ ABSTRACT |

Avoiding 7 Common Mistakes of IT Security Compliance by Qualys, Inc.

April 01, 2009 - (Free Research)
This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals. 
(EGUIDE) READ ABSTRACT |

Securing and Managing Your Enterprise: An Integrated Approach by Novell, Inc.

December 04, 2009 - (Free Research)
Your organization has a dizzying number of platforms, directories, systems and applications - all requiring your attention and administration. So how can you integrate and automate fragmented management tasks while addressing a full range of GRC issues? You can choose the security and system management solution from Novell® 
(WHITE PAPER) READ ABSTRACT |

Critical Technologies for Compliance and Risk Management by Siperian, Inc.

September 16, 2009 - (Free Research)
Smart decision-makers are seeking technology investments -- such as Master Data Management -- to help establish good governance models that will help with regulatory compliance and lower their operational risk. 
(WHITE PAPER) READ ABSTRACT |

An Executive's Guide to Cutting HR Costs by TriNet

December 2007 - (Free Research)
HR is a tremendously important resource in the business equation, but finding ways to cut its cost isn't easy. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options by IBM

May 2011 - (Free Research)
Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization. 
(EGUIDE) READ ABSTRACT |

The Total Economic Impact of CA Identity Manager by CA Technologies.

February 2010 - (Free Research)
In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). Read this paper to learn what they found. 
(WHITE PAPER) READ ABSTRACT |

CW+: Analyst's take: Benefits of Siemens product lifecycle management software for life sciences by ComputerWeekly.com

January 2011 - (Free Research)
Siemens product lifecycle management (PLM) Software for life sciences can help medical device manufacturers manage compliance requirements while supporting greater collaboration, ultimately reducing costs while improving patient outcomes. 
(WHITE PAPER) READ ABSTRACT |

McAfee ePO Deep Command and Intel vPro Technology by Intel

January 2013 - (Free Research)
In this webcast, discover a security and management solution that allows you to remotely support your global enterprise, eliminating the need for expensive and time-consuming deskside visits. See how you can secure your mobile workforce by clicking through to watch now. 
(WEBCAST) READ ABSTRACT |

NetWrix Active Directory Change Reporter - Free! by Netwrix Corporation

July 2010 - (Free Research)
Active Directory change auditing is an important procedure for tracking unauthorized changes and errors to AD configurations. NetWrix AD Change Reporter automates the auditing process to promote both security and compliance. 
(DOWNLOAD) READ ABSTRACT |

Credit Union of Colorado Customer Testimonial by CommVault Systems, Inc.

February 2014 - (Free Research)
Access this webcast to find out which management solution the Credit Union of Colorado selected to achieve true information management strategy and ensure recoverability and compliance. 
(WEBCAST) READ ABSTRACT |

5 Keys to Developing an Awareness Program by Polivec

April 2008 - (Free Research)
Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program. 
(WEBCAST) READ ABSTRACT |

Connect Users Any Time, Everywhere-with Secure, Affordable Business IM by WebEx Communications, Inc.

February 2007 - (Free Research)
Instant messaging (IM) improves productivity by enabling employees to communicate information directly from their desktops. Read this paper to learn how to improve collaboration while allowing for security, compliance and centralized administration. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts