regulatory compliance

Results 101 - 125 of 230Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : 
proofpoint, email archiving, e-discovery, compliance, storage management, electronic discovery, search and retreival, knowledge management, server backups, data security
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 23, 2010
Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold, cloud archiving, storage costs, information governance, archiving, regulatory compliance, information governance, discovery, ediscovery, file shares, managing content, cloud archiving, email retention
    
Proofpoint
Published By: DocuLex     Published Date: Jan 01, 2001
Simply the most cost efficient option for securing your organizations email awaiting data discovery and fulfilling regulatory compliance.
Tags : 
storage management, compliance, retention management, electronic discovery, regulatory compliance, retention
    
DocuLex
Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension
Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc, audit, regulatory compliance
    
NetIQ
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci, pc ftp application, script file exposure, file encryption processes
    
Linoma Software
Published By: IBM Corp     Published Date: Sep 23, 2011
This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions address regulatory compliance.
Tags : 
ibm, smb, backup, technology, data recovery, archive
    
IBM Corp
Published By: Zebra     Published Date: Jul 10, 2014
Maximizing patient safety and improving the quality of care is the ultimate goal for healthcare providers. Doing so requires staying within regulatory compliance, while also advancing staff retention and meeting fiscal constraints. Barcode technologies provide a “virtual voice” to patients, applications and workflows. Barcoding accomplishes this by laying a solid foundation for enhancing patient identification, providing visibility into medical practices, and driving efficiencies throughout healthcare applications, and is an integral part of electronic medical record (EMR) adoption. Download to learn more!
Tags : 
zebra, patient safety, closed loop process, malpractice, misdiagnosis, error costs, financial implications, caregiver, misidentification, emr adoption, electronic medical record, wristbands
    
Zebra
Published By: CenturyLink     Published Date: Nov 18, 2011
Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, disaster, threats, downtime, regulatory, compliance, bcdr, business continutity, protection
    
CenturyLink
Published By: Esker     Published Date: Jan 06, 2014
How to increase profit and productivity via Accounts Payable Automation in an ERP environment
Tags : 
esker, accounts payable, erp, productivity, automation solution, erp applications, business landscape, internal processes, automation, ap operations, level of maturity, modernization, manual vendor, invoice processing, ap challenges, albemarle, regulatory compliance
    
Esker
Published By: Esker     Published Date: Jan 06, 2014
How Adding AP Workflow Automation to Vendor Invoice Processing Can Make Your AP Operation Best-in-Class
Tags : 
esker, accounts payable, erp systems, end-to-end automation, productivity, automation solution, erp applications, business landscape, internal processes, automation, ap operations, level of maturity, modernization, manual vendor, invoice processing, ap challenges, albemarle, regulatory compliance
    
Esker
Published By: Esker     Published Date: Jan 06, 2014
Manual processing of vendor invoices presents a roadblock to the success of your accounts payable (AP) department and overall business objectives. As you look to automation to get your company on the right track, consider this guidebook your map along the 7-step path to AP automation success.
Tags : 
esker, accounts payable, erp, productivity, automation solution, erp environment, business landscape, internal processes, automation, ap operations, level of maturity, modernization, manual vendor, invoice processing, ap challenges, regulatory compliance, procure-to-pay cycle, manual to touchless
    
Esker
Published By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : 
employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program, employee health incentive pgoram, employee wellness incentive program, workpace wellness program, workplace health program, workplace health promotion, health and wellness program, workpace health program, workplace health promotion, health and wellness program, corporate health program cost, affordable care act compliance, afordable care act provisions
    
The Vitality Group
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
Published By: Silanis     Published Date: Aug 30, 2015
Download this report for an in-depth examination of how electronic signatures are diminishing time consuming paperwork and allowing clinicians to prioritize patient care.
Tags : 
silanis, esignlive, electronic signature, regulatory compliance, compliance, health records, digital signature, signature, paperwork, contracts, forms, paperwork
    
Silanis
Published By: DocuSign     Published Date: Mar 23, 2016
In today’s digital world, paper documents are an obstacle to doing business. Implementing a Digital Transaction Management (DTM) system can help, but financial services firms need solutions that offer bank-level security, regulatory compliance, operational efficiency, and a positive end-user experience. Read the report and discover the top 10 reasons why Financial Services firms choose DocuSign for their Digital Transaction Management and esignature solution.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Mar 23, 2016
Download this complimentary Ombud analyst report which examines best practices for leveraging DocuSign’s Digital Transaction Management solution for CIA compliance and the impact such technologies are already having on forward-thinking Fortune 500 companies.
Tags : 
    
DocuSign
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.