Configuration Corporate ComplianceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Configuration Corporate Compliance returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Change and Configuration Management
 •   Data Security
 •   Treasury / Cash / Risk Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Network Security
 •   Business Process Management (BPM)
 •   Security Policies
 •   Business Intelligence Solutions
 •   Security Monitoring

Related Searches
 •   Benefits Configuration Corporate
 •   Configuration Corporate Metrics
 •   Configuration Multi
 •   Configuration Plans
 •   Info Configuration Corporate Compliance
 •   Methods Configuration Corporate
 •   Network Configuration
 •   Objectives Configuration Corporate
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Top considerations for manufacturing compliance software by Epicor Software Corporation

November 08, 2012 - (Free Research)
This e-guide explores environmental and workplace compliance requirements and the considerations that manufacturers should keep in mind when choosing compliance software for their company. 
(EGUIDE) READ ABSTRACT |

SAP GRC Access Control Solution by HCL Technologies Ltd.

May 2008 - (Free Research)
This white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning. 
(WHITE PAPER) READ ABSTRACT |

Records Management Implications of The Affordable Care Act by Iron Mountain

November 2013 - (Free Research)
This white paper explores the implications of major regulations updates being made due to the Accordable Care Act (ACA) to healthcare records management in 2014. 
(WHITE PAPER) READ ABSTRACT |

Managing the Transition to International Financial Reporting Standards by Oracle Corporation

July 2008 - (Free Research)
This white paper identifies the many challenges companies face when implementing International Financial Reporting Standards (IFRS) in corporate reporting. The Oracle solution provides the high level of analysis and transparency that companies need in today's demanding and uncertain global financial reporting environment. 
(WHITE PAPER) READ ABSTRACT |

Duet Software for Microsoft and SAP Applications: Bridging the Desktop to the Enterprise by SAP America, Inc.

November 2007 - (Free Research)
Constantly switching between enterprise applications and business software lowers productivity. Learn how Duet simplifies the way SAP users access and use SAP applications, while enriching the Microsoft Office experience. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

IT Download - Orion Network Configuration Manager (NCM) by SolarWinds, Inc.

February 2009 - (Free Research)
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies. 
(TRIAL SOFTWARE) READ ABSTRACT |

NetBackup 6.5: Enabling Next-Generation Disk-Based Data Protection by Symantec Corporation

February 2008 - (Free Research)
Symantec's Veritas NetBackup 6.5, the latest release of the company's established market-leading enterprise backup and recovery solution, provides disk-based data protection for remote office and enterprise datacenter environments. 
(WHITE PAPER) READ ABSTRACT |

The Age of Compliance: Preparing for a Riskier and More Regulated World by SAP America, Inc.

February 2011 - (Free Research)
Most organizations find managing risk and compliance a challenge – but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise – and protect both corporate performance and reputation. 
(WHITE PAPER) READ ABSTRACT |

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.

December 2008 - (Free Research)
Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

What Your CIO Should Know: Automated Policy Enforcement and Desired State for Enterprise PCs by Persystent Technologies

June 2008 - (Free Research)
Automating PC policy enforcement and desired state ensures that local and remote desktops and laptops remain compliant and maintain optimum availability which helps companies reduce PC support costs, and enhance user productivity and satisfaction. 
(WHITE PAPER) READ ABSTRACT |

June Issue of Information Security magazine: Mobile Security: A New Game Plan by Information Security Magazine

June 2011 - (Free Research)
This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges. 
(EZINE)

Bringing Automation to the Data Center by CA Technologies.

October 2008 - (Free Research)
A number of factors have emerged that clearly demonstrate the requirement for a more holistic approach to data center management. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

The Impact of Work Force Agility on Business by SkillSoft Corporation

April 2008 - (Free Research)
This paper examines the qualities of business agility, the challenges that restrain agility and how leadership, technology, business-critical information and other organizational aspects can improve an organization's agile ability. 
(WHITE PAPER) READ ABSTRACT |

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

The GeoTAX ® Enterprise Tax Management solution by Pitney Bowes Group 1 Software

The GeoTAX ® Enterprise Tax Management solution provides you with the necessary tools to centralize all your corporate tax jurisdiction processing needs and supports critical tax compliance issues. 
(SOFTWARE PRODUCT)

IPAM Intelligence: All Road Leads To Proteus by BlueCat

October 2010 - (Free Research)
As IPAM evolves from a simple marriage between DNS and DHCP services, its definition cannot be limited to simply the benefits derived from dynamically linking DNS and DHCP functionality together. IPAM transcends this marriage to include features and functions shaped by this new requirement in an age of dynamic IP address data. 
(WHITE PAPER) READ ABSTRACT |

Niksun NetDetectorLIVE Data Sheet by NIKSUN

NetDetectorLive is a content and compliance monitoring appliance enabling companies to monitor content flowing in and out of their corporate networks. 
(HARDWARE PRODUCT)

Configuration Auditing – The Next Critical Step in Compliance by nCircle

August 2010 - (Free Research)
In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly. 
(WHITE PAPER) READ ABSTRACT |

Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights by SAP America, Inc.

September 2010 - (Free Research)
This Executive Insights paper describes how the combination of EPM and GRC solutions is now more critical than ever for business success. This document also discusses how EPM and GRC must be linked to business intelligence tools and supported by comprehensive services to ensure that the data generated is used appropriately. 
(WHITE PAPER) READ ABSTRACT |

Configuration and Change Management for IT Compliance and Risk Management by Tripwire, Inc.

November 2007 - (Free Research)
This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements. 
(WHITE PAPER) READ ABSTRACT |

Oracle Enterprise Manager 11g Configuration Management Pack by Oracle Corporation

April 2010 - (Free Research)
This white paper takes a three-pronged approach to configuration management: simplifying the management of your IT infrastructure; improving the level of service you provide your end users; and enforcing compliance with real-time change detection for files, database objects, users, and processes. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts