ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance (Systems Operations) Research

  • Data protection rises up business agenda

    Sponsored by: TechTarget ComputerWeekly.com

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

  • Financial markets regulatory outlook 2017

    Sponsored by: TechTarget ComputerWeekly.com

    Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.

  • 8 Simple Steps for Automating Governance, Risk and Compliance (GRC)

    Sponsored by: ServiceNow

    Automating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.

  • Improving Revenue and Population Health: New Strategies for Health IT

    Sponsored by: Medfusion

    Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.

  • How IAM Systems Support Compliance

    Sponsored by: Beta Systems

    Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.

  • HIPAA Compliance Checklist: The Key to Staying Compliant in 2020

    Sponsored by: Ostendio

    Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.

  • Understanding Data Privacy and CCPA

    Sponsored by: Micro Focus

    In this e-guide, get a better understanding of data privacy through two expert articles about the intersection of marketing and data privacy as well as everything you need to know about the California Consumer Privacy Act.

  • GETTING GDPR RIGHT

    Sponsored by: Attunity

    Today's businesses can no longer treat customer privacy as an afterthought. Without a singular mandated solution, companies need to create the right GDPR roadmap. Download this white paper to learn more.

  • 8 Simple Steps for Automating Governance, Risk and Compliance (GRC)

    Sponsored by: ServiceNow

    Automating Governance, Risk, and Compliance (GRC) greatly reduces costs and improves efficiency. This paper provided 8 simple steps for automating GRC.

  • Get your Content Management System GDPR-Ready

    Sponsored by: Box

    In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • GRC Strategies for the Digital Business

    Sponsored by: TechTarget Security

    Digitization has become a fact life for businesses, but the increased data volumes and associated information security risk puts a strain on digital governance, risk and compliance resources. In this SearchCompliance handbook, learn how companies are adapting GRC budgeting and strategic processes to keep up with the speed of digital business.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • Beyond BYOD: How IoT and new tech is changing modern GRC

    Sponsored by: TechTarget Security

    As the IoT continues to gain popularity, capitalizing on its business benefits require big changes to companies' GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data management, security and compliance processes, and strategies to take full business advantage of IoT data.

  • Cybersecurity and Privacy Compliance: The Delicate Balance

    Sponsored by: TechTarget Security

    This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.

  • Software Compliance at a Fast Velocity

    Sponsored by: Chef Software

    How can you stay compliant with your development, even under increased pressure to release at a breakneck velocity? Access this report to see top compliance tips, and how to stay relevant and legal.

  • Cloud Risk Management: Governance Strategies to Protect Digital Assets

    Sponsored by: TechTarget Security

    In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.

  • Endpoint Security Management: Beyond Antivirus

    Sponsored by: TechTarget Security

    Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.

  • Data Governance Strategies for the Digital Age

    Sponsored by: TechTarget Security

    The digital age has forced many companies to alter - and sometimes completely revamp - data governance processes. In this handbook, learn about big data governance complications and the latest information management strategies for adapting to increased storage needs, data-specific compliance mandates and security vulnerabilities in the digital age.

  • Deploying Microsoft Exchange 2013 Just Got Easier

    Sponsored by: Citrix

    Access this informative guide that explains how to deploy Microsoft Exchange 2013 with an ADC that ensures remote access and load balancing of core components.

  • CIO Decisions E-Zine - February 2015

    Sponsored by: TechTarget CIO

    When it comes to high-profile data breaches, hindsight is 20/20. In this issue of CIO Decisions, we examine the new security paradigm and how CIOs are strategizing to protect data.

  • BYOD Compliance: Keep Mobile Data Regulation-Ready

    Sponsored by: TechTarget Security

    In this SearchCompliance handbook, learn cutting-edge BYOD compliance strategies to keep mobile data secure and compliant with regulations.

  • The SOX Effect

    Sponsored by: TechTarget Security

    In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.

  • Addressing HIPAA privacy compliance on hospital wireless networks

    Sponsored by: Absolute

    In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.