Compliance

Results 1 - 25 of 496Sort Results By: Published Date | Title | Company Name
By: OpenText     Published Date: May 22, 2018
Learn what enterprises like yours are doing to conquer compliance. And get all the latest compliance management trends and best practices.
Tags : opentext, gdpr, gdpr compliance, regulations, compliance, eu compliance, governance, internet security, security policies, best practices, business management, records management, pci compliance, employee training software, international computing
     OpenText
By: Globality     Published Date: Apr 05, 2018
Frustration with high legal fees and demand for local regulatory knowledge may give boutique law firms an edge with larger clients.
Tags : globality, legal, compliance, regulations, local regulations, security management, security policies, best practices, business management, information management, financial management
     Globality
By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion, sharepoint, filenet, documentum, ecm, opentext, archive, assets, digital assets, networking, it management, knowledge management, enterprise applications
     Adlib Software
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, backup and recovery, storage management, email security, security management, document management, records management, search and retrieval, email archiving
     Mimecast
By: Mimecast     Published Date: Mar 31, 2009
The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage, idc, tco, architecture, secure, storage management, application security, compliance, security management, security policies, web service security, ebusiness, email archiving
     Mimecast
By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, compliance, configuration management, collaborative commerce
     123Together
By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance, backup and recovery, storage area networks, security management, information management, email archiving
     Mimecast
By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, application security, email security, security management, mobile workers, business process automation, business process management, collaboration, collaborative commerce, messaging
     Mimecast
By: Stream Data Centers     Published Date: Apr 13, 2018
Download the new Data Center Frontier Special Report to learn how to create complete resiliency and compliance in critical environments.
Tags : stream data centers, compliance, resiliency, mission critical environment, uptime, security, data center security, network security, backup and recovery, storage management, disaster recovery, data protection, productivity, data center design and management
     Stream Data Centers
By: iboss     Published Date: Jan 22, 2018
When the General Data Protection Regulation (GDPR) replaces the European Unionís Data Protection Directive 95/46/ec on May 25, 2018, businesses across the globe will be subject to a wealth of potential fees and penalties for non-compliance.
Tags : iboss, gdpr, gdpr compliance, compliance, general data protection regulation, remote access, security policies, web service security, data protection
     iboss
By: RSA     Published Date: Sep 19, 2017
The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.
Tags : gdpr, data protection, rsa, rsa security, personal data, privacy, compliance, security policies
     RSA
By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security
     RSA
By: RSA     Published Date: Sep 19, 2017
This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably havenít considered.
Tags : rsa, rsa security, gdpr, data protection, compliance, network security, internet security, intrusion detection, best practices
     RSA
By: RSA     Published Date: Sep 19, 2017
Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.
Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security, security policies, web service security, best practices, data replication, database security
     RSA
By: GE Power     Published Date: Mar 01, 2017
Coal power producers worldwide are facing challenges in today's dynamic energy markets. The need to cycle quickly due to renewables on the grid, emissions compliance and the need to operate efficiently are all factors that drive a sustainable coal power business. Find out how the global coal power community can turn to software to help create cleaner and more efficiently produced power.
Tags : coal power plants, coal power, steam power plants, utilities, power producers, power grids, power industry, power plant software, powerplants, compliance, business integration, quality assurance, software compliance
     GE Power
By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : security, security application, ssl, ssl certificates, sha, application security, compliance, intrusion detection, intrusion prevention, security management, security policies
     Entrust Datacard
By: Oracle     Published Date: Sep 06, 2016
Manufacturing faces many challenges in the 21st century with an explosion of new technologies, increasing regulations and ever-rising customer expectations. Itís time to re-imagine manufacturing.
Tags : oracle scm cloud, cloud computing, cloud, scm, security, security application, application security, compliance, internet security, security management
     Oracle
By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : supply chain, cloud computing, cloud, supply chain management, compliance, oracle, application security, security management
     Oracle
By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : supply chain, cloud computing, cloud, supply chain management, compliance, oracle, application security, security management
     Oracle
By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : supply chain, cloud computing, cloud, supply chain management, compliance, oracle, application security, security management
     Oracle
By: NAVEX Global     Published Date: Aug 18, 2016
In 2015, NAVEX Global partnered with an independent research agency to survey ethics and compliance professionals with responsibility for administering training across their organizations. The goal was to determine their top priorities and challenges. The findings represent responses from 677 individuals responsible for ethics and compliance programs.
Tags : compliance programmes, compliance, ethics, compliance programme, risks, ethics and compliance programme, risk areas, security management, risk management
     NAVEX Global
By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companiesí cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control, anti spam, anti spyware, anti virus, application security, authentication, compliance, identity management, intrusion detection, intrusion prevention
     Logrhythm
By: Logrhythm     Published Date: Feb 24, 2016
In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.
Tags : logrhythm, cyber attacks, cyber threat, security, security application, application security, compliance, hacker detection, intrusion detection, intrusion prevention, security management, security policies
     Logrhythm
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : citrix, cyberthreat defense, report, 2015, network security, anti virus, compliance, identity management, security management, wireless security, best practices
     Citrix Systems, Inc.
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.