ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance Best Practices Research

  • Improving regulatory compliance management through log analysis, SIM

    Sponsored by: HP Enterprise Security

    This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.

  • eBook: Trends in Healthcare Data Protection

    Sponsored by: LANDesk Software

    This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.

  • Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System

    Sponsored by: Iron Mountain

    Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.

  • IT Decision Checklist: Security Information and Event Management

    Sponsored by: HP Enterprise Security

    As the complexity of the networks IT manages continues to increase, so too does the volume of security-related information generated by network devices. This exclusive e-zine explores the business and technical considerations in selecting the security information management (SIM) tools you need to maintain control.

  • Deploying desktop virtualization technology in a health care setting

    Sponsored by: Accelera Solutions

    This E-Guide addresses the most important considerations for health care organizations that are planning - or are in the midst of - virtual desktop implementation.

  • Optimise the Healthcare Data Centre through Operational Efficiency and Data Resilience

    Sponsored by: Hitachi Vantara

    This white paper offers valuable insight into how modern health care facilities can ensure the continuity of operations, even in the face of an unforeseen disaster. Additionally, the ROI associated with a data resilience plan is explored.

  • E-Guide: Health care, cloud storage providers and data ownership

    Sponsored by: Intel

    This E-Guide discusses the HIPAA requirements around patient’s access to his or her records as well as issues surrounding data ownership when health care data is stored in the cloud.

  • Closed-loop Records Management: The Stakes Are Too High to Ignore

    Sponsored by: RSD

    As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.

  • UCB Gains Efficiencies and Realizes Lower TCO with CallCopy Call Recording

    Sponsored by: NACR

    Uncover why a implementing a CallCopy recording solution that is easy to use, search, update, support and maintain can offer a lower TCO than other solutions, as well as fulfilling all your call recording needs.

  • Cloud Security Myths and Strategies Uncovered

    Sponsored by: VMware, Inc.

    Security and compliance is the most often-cited barrier to cloud adoption. Read what David Hunter, CTO of Platform Security from VMware, and Art Coviello Jr., Executive Chairman of RSA, say about ensuring control and visibility in a secure cloud.

  • Usability and Compliance: The Carrots and Sticks that Drive E-Procurement Success

    Sponsored by: Simplifying-IT

    Enhancing usability is the key to getting beyond tacit user acceptance of an e-Procurement system to the full adoption and compliance that yields cost reduction and full ROI. Read this paper to learn the full compliance strategies that best-in-class organizations are using for their e-Procurement implementations.

  • Channel Ezine December

    Sponsored by: IBM

    How are you expanding your business in the channel in 2012? What areas of specialization are your customers clamoring for? What are you doing to address their needs? Check out this December issue of Channel Strategies and make sure you're on the right track for 2012.

  • Data Centre Energy Efficiency IT Handbook

    Sponsored by: TechTarget Data Center

    The deadline for the UK's Carbon Reduction Commitment scheme has now passed, and companies will begin to receive fines if they can't demonstrate how they've reduced their carbon footprint or are putting processes in place to do so. This expert IT handbook offers detailed information about this new regulation and how organisations can adhere to it.

  • 5 "Need To Knows" : Cloud Archiving for e-Discovery/Compliance

    Sponsored by: FuseMail

    Retrieval requests, such as those associated with e-discovery and compliance, can be a problem for companies and IT managers today. Fortunately, cloud-based archiving is on the rise and can fulfill your compliance demands. Check out this SearchCloudStorage.com E-Guide to learn five “must knows” and more.

  • Great collaboration begins with good governance

    Sponsored by: TechTarget Content Management

    For a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.

  • How to Comply with the HPAA Security Rule

    Sponsored by: Redspin, Inc.

    The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.

  • E-Guide: Integrating security into the ALM lifecycle

    Sponsored by: TechTarget Security

    In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.

  • Creating a Compliance Culture: Best Practices

    Sponsored by: TechTarget Security

    Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.

  • Protecting Vital Business Interests with a Simplified Storage Solution

    Sponsored by: DellEMC and Intel®

    Data growth and regulatory requirements have made backup, recovery, and archiving critical aspects of enterprise operations. Dell Services experts can assess how effectively an information infrastructure is getting the job done and deploy integrated, best-of-breed storage solutions to help ensure the safety and recoverability of critical data.

  • Compliance and Risk Management: Factoring compliance as part of your risk management equation

    Sponsored by: IBM

    Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.

  • A Decision Maker's Guide to Log Management

    Sponsored by: HP Enterprise Security

    Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.

  • Compliance Frameworks That Enhance e-Discovery Effectiveness

    Sponsored by: AXS-One, a Daegis Company

    The threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace.

  • E-guide: Top Tips for Today’s Archiver

    Sponsored by: Symantec Corporation

    Check out this E-Guide from SearchDataBackup.com to learn how to choose a data archiving strategy and if using tape or disk is the best archiving method for your business. Also learn other archiving best practices to keep in mind.

  • Information Retention and eDiscovery Survey

    Sponsored by: Symantec Corporation

    This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.

  • Datacenter Efficiency with Oracle x86 Blade System Solutions

    Sponsored by: Oracle Corporation

    The integration of Oracle's x86 blade systems, Oracle VM, and Oracle Unified Storage appliances, connected with either Ethernet or InfiniBand fabric services, forms a dynamic and elastic infrastructure-as-a-service solution for private cloud deployments. Read this white paper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.