ComputerWeekly.com Research Library

Powered by Bitpipe.com

Compliance (Systems Operations) Multimedia

  • Enterprise Vault Archiving Overview

    Sponsored by: Symantec Corporation

    This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.

  • Hardening Hadoop for the Enterprise

    Sponsored by: WANdisco

    Prepare for Hadoop implementation with this knowledgeable webcast.

  • Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions

    Sponsored by: Symantec Corporation

    View this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • HIPAA Compliance Statement

    Sponsored by: TigerText, Inc.

    This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.

  • Best practices in managing requirements in Energy and Utilities industries

    Sponsored by: IBM

    This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.

  • Reduce Costs and Stay Compliant With Next-Generation SAM

    Sponsored by: CDW Corporation

    Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.

  • Strategies to Survive Software Asset Management Audits

    Sponsored by: CDW Corporation

    This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.

  • Economic & Productivity Impact of IT Security on Healthcare - Video

    Sponsored by: Imprivata

    View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations.

  • PCI DSS Simplified: What You Need to Know

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating PCI DSS compliance is far from a trivial exercise. In this webcast, join compliance experts from AlienVault to learn how to implement effective incident response with emerging threat intelligence and more.

  • Netwrix Auditor Enterprise Edition

    Sponsored by: Netwrix Corporation

    When diagnosing the cause of your Active Directory problems, native auditing won't show you the complete picture of exactly what changed before your problems started. Netwrix Auditor does what native auditing can't: Download your free 20-day trial of Netwrix Auditor today.

  • File Archive: the next big thing?

    Sponsored by: EMC Corporation

    Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more.

  • A Proactive Approach to Compliance, Security and Audit

    Sponsored by: IBM

    This exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure.

  • SIEM Demo: Get Complete Security Visibility in an Hour

    Sponsored by: AT&T Cybersecurity

    Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.

  • Quick Dirty Dozen PCI Compliance Simplified

    Sponsored by: AT&T Cybersecurity

    Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.

  • Healthcare Networking Classroom

    Sponsored by: TechTarget Health IT

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • Enterprise capture ushers in a new era of business process efficiency

    Sponsored by: IBM

    Take a few minutes to discover how enterprise capture software from IBM can help you reduce the cost and complexity of business processes across your organization.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    Sponsored by: ArcSight, an HP Company

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • Keep Your Enemies Closer - Get Proactive about Security

    Sponsored by: AT&T Corp

    Forrester Research Inc. guest speaker, Khalid Kark, VP-Research Director, along with Steve Hurst of AT&T, will highlight today's complex enterprise security environments, discuss the latest research on security infrastructure essentials and explain how managed security services can reduce your risk and simplify policy compliance.

  • Maintaining Control & Compliance in the Cloud with Data-Centric Security

    Sponsored by: SafeNet, Inc.

    With promises of flexibility, ease of use, and lower costs, Service Oriented Architectures (SOA) and Virtualization are leading IT to the new outsourced computing model known as Cloud. This session will provide details on the impact of Cloud on information security and the data-centric solutions for specific use-cases.

  • IBM Rational Build Forge Demos

    Sponsored by: IBM

    Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.

  • PCI Compliant Yesterday. Still Compliant Today?

    Sponsored by: Tripwire, Inc.

    This webcast talks about the need for automated compliance. The webcast answers questions like: Why is PCI compliance necessary? Should PCI regulations be viewed as a final checklist, or a beginning set of best practices? Watch this webcast to learn more.

  • Rational Build Forge Demo Series

    Sponsored by: IBM

    Access IBM Rational Build Forge demos to see how it can be used to create a software assembly line to automate and accelerate software delivery. Learn how Rational Build Forge can help development teams automate repetitive tasks, uncover development bottlenecks, determine trends for specific projects and manage compliance mandates.

  • IBM Tivoli Security User Compliance Management Demo

    Sponsored by: IBM

    This demonstration shows how Tivoli's security management products work together to provide an audit trail of unauthorized access when an IT administrator logs in to a human resource database containing sensitive information.

  • Embarcadero Change Manager 5.0

    Sponsored by: Embarcadero Technologies, Inc.

    With Embarcadero Change Manager 5.0 you can simplify and automate database change management, streamline development cycles, and ensure availability, performance, and compliance. Download this demo and experience it for yourself.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.