compliance

Results 1626 - 1650 of 2032Sort Results By: Published Date | Title | Company Name

Application Performance Management for Dummies

Published By: Riverbed     Published Date: Apr 03, 2014
This book introduces you to application performance management (APM) solutions and how these tools can help you monitor and troubleshoot your mission-critical applications — from the perspective of your users, as well as your systems.
Tags : 
riverbed, application performance management, apm, service management, compliance, performance management, application integration, performance testing
    
Riverbed

10 Reasons You Need Network and Application Visibility

Published By: Riverbed     Published Date: Apr 03, 2014
Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : 
riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
    
Riverbed

Network Performance Management for Dummies

Published By: Riverbed     Published Date: Apr 03, 2014
The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.
Tags : 
riverbed, npm, network performance management, performance management, network management, networking, performance tools, security
    
Riverbed

Luftansa Case Study

Published By: HP     Published Date: Apr 13, 2014
Read the Lufthansa customer case study and learn how a Quality Center SaaS model enabled the airline to cut IT cost while providing 24 hour a day service.
Tags : 
compliance, cost-efficiency, hp quality center, it-governance, software as a service (saas), software development, software quality assurance, test management
    
HP

Turkcell (Turkey) Case Study (Operations Automation)

Published By: HP     Published Date: Apr 13, 2014
Cut the cost and complexity of managing you large, hybrid server estate. Learn how Turkcell, the leading GSM operator in Turkey, reaps benefits from server automation including reductions in the time needed to check adherence to security compliance policies from 55 hours to 20 minutes and cutting the time taken to provision virtual PCs from five days to 40 minutes.
Tags : 
hp operations orchestration, hp server automation, hp support, it case study, turkcell, bsm, business service management, networking
    
HP

Capital One: Winner 2014 Awards of Excellence for IT Management Hall of Famers

Published By: HP     Published Date: May 05, 2014
Leveraging HP breadth to increase security, lower risk, increase efficiency: Find out how CapitalOne has improved compliance, lowered risk, eliminated bottlenecks, reduced cost, and moved from silos to integration by leveraging the HP Software portfolio. Headquartered in McLean, Virginia, Capital One offers a broad array of financial products and services to consumers, small businesses and commercial clients in the U.S., Canada and the UK.
Tags : 
bsm, business service management, it operations group, it case study, capital one, automation, it management, knowledge management
    
HP

How to Leverage Log Data for Effective Threat Detection

Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
AlienVault

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting

Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : 
alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
AlienVault

Six Steps to SIEM Success

Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting

Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault

How to Simplify PCI DSS Compliance with AlienVault USM

Published By: AlienVault     Published Date: Aug 13, 2015
Demonstrating compliance with PCI DSS is far from a trivial exercise. Join us for this technical session to learn how AlienVault USM can help you achieve PCI DSS compliance and improve your overall security posture.
Tags : 
compliance, pci, dss, technical, security, challenges, it management, knowledge management
    
AlienVault

5 Steps to Implement and Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Nov 10, 2015
Implement and maintain PCI DSS compliance at your organization
Tags : 
operations, structure, compliance, security, management, data, best practices, business intelligence
    
AlienVault

How to Simplify PCI DSS Compliance with AlienVault USM

Published By: AlienVault     Published Date: Nov 10, 2015
Simplifying PCI DSS Compliance.
Tags : 
compliance, data, security, structure, management, security management, application integration, best practices
    
AlienVault

Security in Fax: Minimizing Breaches and Compliance Risks

Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management
    
OpenText

Going Beyond Email Compliance: 7 Surprising Use Cases for Email Suppression

Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing
    
UnsubCentral

Compliance Challenges and How to Solve Them

Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa, hipaa compliance, database development, data deduplication
    
FORTRUST

The Total Economic Impact™ of Microsoft Office 365

Published By: Microsoft Office 365     Published Date: Jan 21, 2016
Learn how much money your business can save. In an objective study commissioned by Microsoft, Forrester Consulting investigated the Total Economic Impact™ for small to medium sized businesses, with 1 to 250 employees, using Office 365. The study revealed a sizeable return on investment. One business founder had this to say, “The productivity gain is the main thing for me with Office 365. It’s allowed everybody to be more productive, and if there is any element of downtime on hardware, it’s just a case of moving into another location, whether it’d be the next desk, office, or Starbucks.” Discover these findings and more when you download the free report: • Improved Business Continuity. How enhanced business continuity lead to an avoidance in lost billable hours of $15,000 annually. • Increased mobile worker productivity. How an investment in mobility saved45 hours per year per worker. • Lowered Security, Risk, and Compliance Costs. How an organization went from 15 data breaches per year
Tags : 
it management
    
Microsoft Office 365

Online Meetings: Secure Your Video Conferences eBook

Published By: Microsoft Office 365     Published Date: Jun 03, 2016
Did you know that just like email, video conferencing is susceptible to security risks? Our “Online Meetings: Secure Your Video Conferences” eBook shows you how small and medium businesses can use Skype for Business to provide effective collaboration tools—like HD video conferencing*—that are more secure and simple to use. In this ebook, you’ll discover how to: Save on security, risk, and compliance costs Reduce risk with a comprehensive solution Simplify your IT environment and increase security *For HD video, compatible HD hardware and broadband connection with at least 4 Mbps required.
Tags : 
    
Microsoft Office 365

DocuSign for HR Customer Success Case Study Sampler

Published By: DocuSign     Published Date: Mar 23, 2016
The world of HR today is changing. The talent pool is becoming more global and tech-savvy, and candidates expect an online and mobile experience. Many are leveraging DocuSign to improve compliance and free up time for other critical HR functions. Download this case study sampler to learn more about how other companies have increased efficiency by utilizing DocuSign’s eSignature platform in the HR industry.
Tags : 
    
DocuSign

CIO White Paper: Ensuring Compliance with Digital Transaction Management

Published By: DocuSign     Published Date: Mar 23, 2016
This whitepaper examines these pain points and suggests how a proven DTM solution such as DocuSign’s can work with an enterprise-grade productivity platform like Microsoft Office 365 to address your pain points, mitigate risk, and strengthen your competitive advantage.
Tags : 
    
DocuSign

CIO White Paper: Ensuring Compliance with Digital Transaction Management

Published By: DocuSign     Published Date: Mar 23, 2016
A recent survey of IT professionals by IDG Research shows that companies are struggling to keep their processes and documents in compliance with frequently changing — and often conflicting — regulatory standards.
Tags : 
    
DocuSign

DocuSign in Procurement – Insist on It

Published By: DocuSign     Published Date: Feb 13, 2017
See firsthand how DocuSign improves precurement experience, maximizes ROI, and ensures compliance as the global standard for eSignature solutions.
Tags : 
    
DocuSign

HR Customer Case Study Sampler (2017)

Published By: DocuSign     Published Date: Apr 12, 2017
The world of HR today is changing. The talent pool is becoming more global and tech-savvy, and candidates expect an online and mobile experience. Many are leveraging DocuSign to improve compliance and free up time for other critical HR functions. Download this case study sampler to learn more about how other companies have increased efficiency by utilizing DocuSign’s eSignature platform in the HR industry.
Tags : 
    
DocuSign

The Digital Future of Staffing: 5 Solutions to Improve Hiring and Retention

Published By: DocuSign     Published Date: Apr 12, 2017
Staffing companies play a critical role in recruiting and onboarding talent to ensure that operations don’t skip a beat. In today’s competitive recruiting market, staffing companies need to invest in digital tools to hire and onboard the best professionals faster and more efficiently. Download this brief to learn how DocuSign can help you: • Attract and secure talent faster • Improve security and compliance for everyone • Reduce costs for the workplace
Tags : 
    
DocuSign

Five Key Indicators You Need to Adopt EMM

Published By: VMware     Published Date: Feb 24, 2017
As the volume and variety of mobile devices surge, so do expectations among end users and business leaders to put these devices to work—as tools for productivity and a competitive advantage for the enterprise. With the goal of striking a balance between opportunity and control, increasing numbers of IT decision makers are adopting enterprise mobility management (EMM) solutions. So, how do you know if your organization is ready to make the move? Read this white paper to determine if now is the right time to adopt EMM, especially if your organization experiences: - Increased need for security and compliance - Device expansion - Rapid growth - And more
Tags : 
    
VMware
Start   Previous    59 60 61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.