Compliance FindWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance Find returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Monitoring
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Treasury / Cash / Risk Management
 •   Network Security
 •   Managed Security Services
 •   Automated Security Auditing/ Source Code Analysis
 •   Vulnerability Assessment

Related Searches
 •   Compliance Find Benefit
 •   Compliance Find Contact
 •   Compliance Find Problem
 •   Compliance Method
 •   Compliance Michigan
 •   Computing Compliance
 •   Customer Compliance Find
 •   Purchasing Compliance Find
 •   Risks Compliance
 •   Video Compliance Find
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 04, 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention by Trend Micro, Inc.

July 15, 2010 - (Free Research)
When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it. 
(CASE STUDY) READ ABSTRACT |

Industry Analyst Reports - Getting in Front of IT Compliance and Risk Management by CA Technologies.

July 26, 2010 - (Free Research)
Read this Forrester Consulting analyst report to find out about the trends in managing IT compliance and risk. This report discusses the result of an evaluation conducted by Forrester for CA Technologies. 
(ANALYST REPORT) READ ABSTRACT |

CA Compliance Manager for z/OS by CA Technologies.

May 12, 2009 - (Free Research)
Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk. 
(WEBCAST) READ ABSTRACT |

Governance, Risk, Compliance: Policy Management - Methods and tools by SearchSecurity.com & SearchCompliance.com

May 08, 2009 - (Free Research)
This E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business. 
(EBOOK) READ ABSTRACT |

Virtual Compliance In The VMware Automated Data Center by LogLogic, Inc.

July 21, 2011 - (Free Research)
Switching to a virtual infrastructure not only provides benefits, but also comes with significant change, and organizations must find new ways to collect and manage logs. This paper explores log management in virtualized environments, including its challenges and opportunities. 
(WHITE PAPER) READ ABSTRACT |

5 Ways to Ensure Information Management Compliance by Iron Mountain

March 13, 2012 - (Free Research)
Use this resource as a guide to to make sure your information is maintaining compliance with regulations and standards. Find five tips to help lower your risk profile and boost your audit readiness. 
(DATA SHEET) READ ABSTRACT |

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data by Bit9, Inc.

June 09, 2009 - (Free Research)
As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance... 
(WHITE PAPER) READ ABSTRACT |

Simplify Compliance and Security with Novell® SentinelT Log Manager by Novell, Inc.

May 11, 2011 - (Free Research)
Finding a log management solution that can manage risk, simplify regulatory compliance and provide security for you network can be very difficult. There are many systems that contain some of these tools but now there is a system that can do all of this. 
(WHITE PAPER) READ ABSTRACT |

The Age of Compliance: Preparing for a Riskier and More Regulated World by SAP America, Inc.

February 10, 2011 - (Free Research)
Most organizations find managing risk and compliance a challenge – but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise – and protect both corporate performance and reputation. 
(WHITE PAPER) READ ABSTRACT |

GRC Strategies - Finding the Right Balance of Business and IT by SAP America, Inc.

April 12, 2010 - (Free Research)
This white paper demonstrates that both business and IT GRC initiatives are continuing to grow in relevance and provides key recommendations for companies seeking to transform business processes to reduce costs, improve governance and compliance, while mitigating and managing risk. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options by IBM

May 20, 2011 - (Free Research)
Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization. 
(EGUIDE) READ ABSTRACT |

CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program by Qualys, Inc.

May 2008 - (Free Research)
CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations. 
(CASE STUDY) READ ABSTRACT |

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance by Linoma Software

July 2008 - (Free Research)
In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors. 
(CASE STUDY) READ ABSTRACT |

Eguide: Addressing HIPAA privacy compliance on hospital wireless network by CDW Healthcare

October 2011 - (Free Research)
Health care CIOs are caught between a rock and a hard place. On one hand, demanding patients and increasing numbers of wireless medical devices are requiring they open up their wireless networks. On the other, tighter rules for HIPAA compliance are forcing them to lock networks down. Find out how your peers are coping with this challenge. 
(EGUIDE) READ ABSTRACT |

Tivoli Endpoint Manager: Continuous Compliance in a Distributed World by Mainline Information Systems

June 2011 - (Free Research)
This presentation transcript will teach you about the downfalls of endpoint management including, complexity, compliance and cost. You will also learn how to mitigate these downfalls and find a product where these are non issues. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Tivoli Endpoint Manager: Continuous Compliance In A Distributed World by Mainline Information Systems

May 2011 - (Free Research)
Through this webcast you will learn about endpoint security and the new solutions being offered with more tools included than previous years. You will find out how endpoint security is made up a various security tools in order to meet compliance standards and increase your organizations bottom line. 
(WEBCAST) READ ABSTRACT |

Overcoming Today's Compliance and Security Data-Related Challenges by Hexis Cyber Solutions Inc

May 2014 - (Free Research)
This informative whitepaper explores a unique strategy for overcoming today's compliance and security data-related challenges. 
(WHITE PAPER) READ ABSTRACT |

Quocirca: Dealing with Governance, Risk & Compliance in an Info-Centric World by CommVault Systems, Inc.

April 2014 - (Free Research)
This white paper explains how a GRC platform can transform how an organization operates – internally, externally and legally. It explains how a suitable platform enables better, faster decision making, creating a more competitive organization. 
(WHITE PAPER) READ ABSTRACT |

How to create an effective data protection strategy for IT compliance by SearchSecurity.com

December 2011 - (Free Research)
Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance. 
(EGUIDE) READ ABSTRACT |

Identify and Destroy: Your Two-Step Ticket to Easier Information Compliance by Iron Mountain

June 2013 - (Free Research)
This brief white paper provides a two-step ticket to easier information compliance. Discover three steps to speed and recovery and how to identify and destroy data that is no longer relevant to your business needs. 
(WHITE PAPER) READ ABSTRACT |

FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications by FaceTime Communications

September 2010 - (Free Research)
This whitepaper sets out some of the key rules, guidelines and associated risks for FINRA member firms and suggests ways that organisations can use technology to protect themselves and their RRs. In addition, it looks at some of the other issues that enterprises may encounter when enabling the new internet. 
(WHITE PAPER) READ ABSTRACT |

How to Comply with the HIPAA Security Rule by Thawte Inc.

July 2013 - (Free Research)
In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications. 
(EGUIDE) READ ABSTRACT |

E-Guide: Information Security Essential Guide to Compliance by Information Security Magazine

July 2010 - (Free Research)
Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts