White Paper ComplianceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: White Paper Compliance returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Security Policies
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Materials Compliance Management Solutions
 •   Access Control
 •   Automated Security Auditing/ Source Code Analysis

Related Searches
 •   Imports White Paper Compliance
 •   Proposals White Paper
 •   Skills White Paper Compliance
 •   Survey White
 •   White Lists
 •   White Matrix
 •   White Paper Compliance Free
 •   White Paper Compliance Maintenance
 •   White Paper Compliance Repairs
 •   White Paper Secure
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

10 Ways Excel Drives More Value From Your SAP® Investment... While Making Your SAP Life Easier by Winshuttle, LLC

August 31, 2010 - (Free Research)
This white paper highlights 10 ways Winshuttle's tools and applications utilize Microsoft Office applications and allow you to optimize your SAP investment. The benefits outlined in this white paper are realized by the reduction of SAP operational costs, delivering across the board efficiencies and accelerating top and bottom line improvements. 
(WHITE PAPER) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 01, 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

Assured Federated Records Management - Achieving Compliance across the Enterprise by EMC Corporation

March 12, 2008 - (Free Research)
Compliance is now a major issue for organizations and they're beginning to rethink their records management strategies. Read this white paper to learn about a records management solution that effectively addresses all of the needs required for this task. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards by Advent Software, Inc

July 1967 - (Free Research)
This whitepaper, written in conjunction with Ashland Partners, explains the steps to becoming Global Investment Performance Standards compliant. 
(WHITE PAPER)

Best Practices in Performance Measurement and Reporting: Understanding the Global Investment Performance Standards® by Advent Software, Inc

April 2010 - (Free Research)
Whether you are just starting a compliance program or need to fine-tune your existing process, this document will help you understand the steps involved in becoming GIPS compliant. It is not a substitute for the Standards themselves. It is designed to help you understand the value of compliance, what’s needed to achieve it, pitfalls to avoid. 
(WHITE PAPER)

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

Gone in 30 Days: Exchange, Retention, and Regulatory Compliance by Sherpa Software

September 2009 - (Free Research)
In this white paper, we will discuss how to discover, manage, and archive information within your Exchange enterprise to successfully limit your legal exposure and protect your corporate information. 
(WHITE PAPER) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

Configuration and Change Management for IT Compliance and Risk Management by Tripwire, Inc.

November 2007 - (Free Research)
This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of an Archiving Project White Paper by IBM

August 2011 - (Free Research)
Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests. 
(WHITE PAPER) READ ABSTRACT |

HIPAA Compliance: Sign on to Robust Access Controls by Imprivata

April 2014 - (Free Research)
View this comprehensive white paper to learn how you can reduce the complexities of HIPAA compliance with single sign-on (SSO) technology. 
(WHITE PAPER) READ ABSTRACT |

Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks by OpenText

April 2012 - (Free Research)
This white paper explores the potential compliance related benefits to adopting fax server technology. 
(WHITE PAPER) READ ABSTRACT |

Secure File Transfer in the Era of Compliance by Ipswitch WhatsUp Gold

July 2007 - (Free Research)
Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information. 
(WHITE PAPER) READ ABSTRACT |

Buyer's Guide for Compliance Solutions in Identity Management by Oracle Corporation

June 2008 - (Free Research)
This white paper provides an overview of SOX, GLBA, and HIPAA and translates these mandates into identity management requirements and challenges. 
(WHITE PAPER) READ ABSTRACT |

How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM) by BeyondTrust Corporation

May 2010 - (Free Research)
This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

How Compliance Impacts Backup Strategy by Idera

January 2014 - (Free Research)
Explore this white paper to learn why prudent business practice calls for backing up and securely housing your digital data. Read on to discover how compliance intersects with both digital data and backup. 
(WHITE PAPER) READ ABSTRACT |

Log Management: How to Develop the Right Strategy for Business and Compliance by Dell SecureWorks UK

August 2010 - (Free Research)
Organisations need a business-based approach to creating a log management strategy that will help them detect attacks, deal with mounds of data collected by network and security devices, and meet compliance requirements. This white paper will outline a five step process which will help reduce the complexity of this process. 
(WHITE PAPER) READ ABSTRACT |

Information governance: Reduce risk and improve compliance by Iron Mountain

August 2012 - (Free Research)
This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

November 2010 - (Free Research)
This white paper is aimed at senior staff responsible for company policy on risk, compliance and internal governance. It seeks to highlight the issues Data Leak Prevention (DLP) is designed to solve and how these issues fit into a wider context of information security, compliance and risk. 
(WHITE PAPER) READ ABSTRACT |

The New Age of Compliance: Preparing Your Organization for a New Era of Increased Accountability and Enforcement by Mimosa Systems

June 2009 - (Free Research)
This white paper examines the current state of regulatory compliance and the impact of non-compliance. It also addresses the current political environment and the shift in the compliance landscape and compliance enforcement for which organizations need to be prepared. Finally, it discusses some best practices that can be applied to streamline.. 
(WHITE PAPER) READ ABSTRACT |

End-to-End Enterprise Compliance, Provisioning and Role Enforcement: With Sun Java™ System Identity Manager and SAP GRC Access Control by Sun Microsystems, Inc.

July 2008 - (Free Research)
This white paper describes how a complete end-to-end IAM solution can be configured after exploiting the benefits of the integrated product stack. 
(WHITE PAPER) READ ABSTRACT |

Five Challenges to Continuous PCI DSS Compliance by Tripwire, Inc.

April 2010 - (Free Research)
As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape. Read this white paper to learn what they are and how to overcome them. 
(WHITE PAPER) READ ABSTRACT |

Data Security and Privacy: A Holistic Approach by IBM

September 2011 - (Free Research)
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk. 
(WHITE PAPER) READ ABSTRACT |

Support PCI Security Compliance with Enhanced Solutions from IBM by IBM

February 2009 - (Free Research)
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts