Compliance Find BasedWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance Find Based returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Disk-based Backup & Storage/ RAID
 •   Security Policies
 •   Backup Systems and Services
 •   Storage Security
 •   Business Process Management (BPM)
 •   Network Security

Related Searches
 •   Compliance Find Based Quality
 •   Compliance Find Systems
 •   Compliance Intranet
 •   Compliance Paper
 •   Compliance Portals
 •   Construction Compliance
 •   Methodology Compliance
 •   Portal Compliance
 •   Requirement Compliance
 •   Unix Compliance
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Symantec IT Compliance Solution by Symantec Corporation

March 2009 - (Free Research)
Symantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more. 
(ARTICLE)

CA Compliance Manager for z/OS by CA Technologies.

May 2009 - (Free Research)
Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk. 
(WEBCAST) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

Cloud-based archiving for e-discovery/compliance: Five "need to knows" by Hewlett-Packard Company

May 2013 - (Free Research)
This expert E-Guide discusses five key questions to answer when evaluating or developing a cloud-based archiving strategy for your business. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Application Whitelisting: The Must Have Technology for Security and Compliance Today by McAfee, Inc.

September 2009 - (Free Research)
Read this paper, which is a transcription of a presentation where speakers Stuart McClure, VP of Operations & Strategy, Risk & Compliance Business Unit, at McAfee Incorporated and Evelyn de Souza, Senior Manager, Risk & Compliance, at McAfee discuss application whitelisting and its benefits. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Archiving in the Cloud: Essential Tips and Questions to Answer by Symantec Corporation

November 2012 - (Free Research)
Find out why archiving is a logical first step toward the cloud by checking out this expert, exclusive E-Guide, which offers essential tips and 5 questions to answer as you create an archiving strategy for your company. Read on to access more, such as 5 keys of cloud-based archiving for eDiscovery and compliance. 
(EGUIDE) READ ABSTRACT |

eBook: Data Security in the E-discovery Process by Dell and VMware

December 2011 - (Free Research)
In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security. 
(EBOOK) READ ABSTRACT |

A Process-based Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance by BeyondTrust Corporation

October 2009 - (Free Research)
This white paper outlines a sound, process-based approach to protecting the critical privileged accounts found in most applications, databases, and infrastructure devices throughout the enterprise. This approach integrates features like automated password resets and management workflows, secure storage of credentials, and a sealed operating system. 
(WHITE PAPER) READ ABSTRACT |

Protecting Customer Data: Moving Beyond Compliance by Voltage Security, Inc.

March 2012 - (Free Research)
The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection. 
(WHITE PAPER) READ ABSTRACT |

FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications by FaceTime Communications

September 2010 - (Free Research)
This whitepaper sets out some of the key rules, guidelines and associated risks for FINRA member firms and suggests ways that organisations can use technology to protect themselves and their RRs. In addition, it looks at some of the other issues that enterprises may encounter when enabling the new internet. 
(WHITE PAPER) READ ABSTRACT |

IT Benefits of an Integrated Solution by Centennial-Software

July 2008 - (Free Research)
View this webinar to find out how Enteo Client Lifecycle is being added to HEAT, Remedy, and Footprints as well as other Service Desk Platforms. 
(WEBCAST) READ ABSTRACT |

E-Guide: Best of 2010: The 10 Web Pages Most Read by UK-based IT Pros by EMC Backup and Recovery Solutions

November 2010 - (Free Research)
This searchstorage.co.uk eguide is comprised of the best and most read expert articles. Read this brief guide to find out how to avoid the common pitfalls of  storage planning and how you can prepare your business for 2011. 
(EGUIDE) READ ABSTRACT |

Effectively Manage Access to Systems and Information to Help Optimize Integrity and Facilitate Compliance by IBM

March 2007 - (Free Research)
This paper details a comprehensive, standards-based approach that integrates access control and identity management and enables you to cost-effectively provide users with access to applications and data while protecting assets from unauthor... 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

The Authoritative ID Store Is Dead - How Cloud Changes Provisioning by Intel

October 2011 - (Free Research)
Cloud computing provides additional value by offering a reduction in upfront costs and increased scalability. These benefits are just a few of the reasons why companies are looking to the cloud for user provisioning tools. Watch this webcast to find out how your company can take advantage of cloud-based user provisioning. 
(WEBCAST) READ ABSTRACT |

On-Demand ERP in the Enterprise: A practical CIO guide to implementation by NetSuite

May 2009 - (Free Research)
This paper sets out a framework for deciding on and implementing on-demand ERP within enterprises.. It examines key concerns such as data integrity in enterprise systems, maintaining compliance and ensuring proper process management, as well as discussing new skills and approaches to help maximize returns on investment. 
(WHITE PAPER) READ ABSTRACT |

Information Security E-Zine – June 2014 by SearchSecurity.com

June 2014 - (Free Research)
Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios? 
(EZINE) READ ABSTRACT |

Making Strategic Use of Tape and Cloud Technologies for Offsite Data Protection by Iron Mountain

November 2012 - (Free Research)
This paper explains the necessary reassessment of the ways your company uses and stores data in order to create an effective storage strategy that encompasses your backup, recovery and archiving operations. Learn how to best make a new storage strategy and to explore a new idea: Optimizing off-site data with tape and cloud support. 
(WHITE PAPER) READ ABSTRACT |

10000 Series - Acceleration for VMware ESX Servers by QLogic Corporation

January 2014 - (Free Research)
Take a look at this concise resource to find out how this flash-based acceleration tool can use your existing SAN infrastructure to increase your storage capacity, while continuing SAN data protection and compliance policies. 
(APPLICATION NOTE) READ ABSTRACT |

Do You Know Where Your Assets Are? Maximizing ROI With Radio Frequency Identification (RFID) Asset Management by Intermec

March 2009 - (Free Research)
This white paper examines asset tracking with RFID technology by providing a brief overview of technologies available, an explanation of how passive UHF RFID can be used for asset tracking, an exploration of who's using RFID, a discussion on deciding what to track and making a business case for RFID, and a guide to choosing the right RFID partners. 
(WHITE PAPER) READ ABSTRACT |

Role Based Access Control and Entitlement Management by FoxT

September 2009 - (Free Research)
The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Long-Term Data Protection and Retention: Finding the Correct Balance by Quantum Corporation

March 2009 - (Free Research)
Tape remains the most cost effective, energy efficient and reliable program technology for storing large amounts of inactive, off-line or near-line data while complimenting disk-based data protection and retention solutions. Read this paper and find out why. 
(WHITE PAPER) READ ABSTRACT |

Cloud-Based Email Archiving Pros and Cons by Symantec Corporation

December 2012 - (Free Research)
Explore the benefits and downfalls of cloud-based email archiving in this expert E-Guide brought to you by SearchStorage.com. Find key criteria you shouldn't overlook when considering archiving in the cloud and learn why it's essential to know the ins and outs of whatever service in which you intend to invest. 
(EGUIDE) READ ABSTRACT |

OpSource Improves Global Business Management and Streamlines Revenue Recognition with Intacct by Intacct Corporation

March 2010 - (Free Research)
As OpSource grew as a company, they found many inefficiencies and challenges in their financial management system. Read on to learn how OpSource overcame these challenges by switching to Intacct for a new SaaS financial management system. 
(CASE STUDY) READ ABSTRACT |

Improving Performance and Control in SAP Environments [Cisco ACE XML Gateways] by Cisco Systems, Inc.

November 2011 - (Free Research)
Read this paper to find out how to meet the new challenges posed by the proliferation of XML-based services. Discover an appliance that can be combined with SAP Business Suite and NetWeaver to improve performance, security, availability, and monitoring and auditing (for compliance) for applications and Web services in SAP environments. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts