Product and Services Finder

IT Compliance Management

    
<  1  2  3  4  5  6  >
Symtrex, Inc.  Symtrex Inc., Network Security Specialists, including Log Management, vulnerability assessments, endpoint protection and perimeter security
 
Kaspersky Total Business Solutions Kaspersky Total Business
 
NeatBeat NAC NetBeat NAC
 
IT Asset Management Group  ITAMG is a computer liquidator specializing in IT Asset Disposition, computer liquidation, hard drive shredding services, and data destruction projects of all scopes.
 
ITAMG Data Destruction Solution Data security during equipment disposition is an increasingly scrutinized process. Retired hard drives and electronic media contain sensitive information...
Microsoft IT  Microsoft IT is motivated and inspired every day by how their customers use their software to find creative solutions to business problems, develop breakthrough ideas, and stay connected to what`s most important to them.
LogPoint  LogPoint offers an advanced SIEM solution, delivering on Log Management, Compliance, Forensics, Operational Insight, Application Management, Information Security, ISO 27001, SOX, Advanced Persistent Threats, and SAP...
 
LogPoint SIEM & Log Management tool
Honeywell International Inc.  Honeywell is a Fortune 100 company that invents and manufactures technologies to address tough challenges linked to global macrotrends such as safety, security, and energy. With approximately 122,000 employees worldwide,...
Microsoft Dynamics (formerly MBS)  Microsoft Dynamics — formerly Microsoft Business Solutions — delivers a line of products that automate and help improve financial, customer relationship, and supply chain management.
SAManage  on-demand IT management software - IT Asset Management and IT Service Management
Promisec  Promisec delivers always-on, comprehensive internal network security solutions that detect and eliminate pre-defined and user-specific internal threats, enable more effective enforcement of security policies, and prevent...
Accenture Business Services  The history of Accenture Business Services for Utilities is a fascinating one, distinguished by the imagination and foresight of multiple key players. Officially launched April 1, 2003, Accenture Business Services for...
Tango/04 Computing Group  Tango/04 develops systems management, monitoring, security, BSM and performance management software.
 
VISUAL Control Center Now, IT departments can control from the same easy to use graphical interface, the vital signs of any number and combination of iSeries and Windows servers...
 
Visual Message Center VISUAL Message Center, Tango/04's suite of products for the management of IT infrastructure, provides a technological foundation for the development of...
 
Sentinel Intrusion Prevention Systems  Everything you need for state-of-the-art intrusion prevention in one affordable, fixed monthly fee. Including equipment, support, management, setup, service, updates, and monitoring starting at only $349/mo.
EMC Corporation  EMC provides the technologies and tools that can help you release the power of your information. We can help you design, build, and manage flexible, scalable, and secure information infrastructures. And with these...
APTARE, Inc  APTARE® (Latin for adapt, fit, apply) was founded in 1993 by a team of enlightened computer software engineers that focused on designing and delivering transactional database systems that were massively scalable in two...
 
APTARE StorageConsole 7.2 StorageConsole empowers you with detailed and immediate knowledge of your backup infrastructure so that you can directly improve your data availability.
 
APTARE StorageConsole Backup Manager APTARE StorageConsole Backup Manager gives IT administrators a centralized, real-time view of their data protection environment, allowing them to...
 
<  1  2  3  4  5  6  >
More

IT Compliance Management Research Library

NetClarity - Use NetClarity to Secure Your Wireless Networks
Symtrex, Inc.
USE NETCLARITY TO SECURE YOUR WIRELESS NETWORKS Preface................................. ....................................... Two Immediate Threats to Your Network...... Practical Access Control Protects Against Both Att Threat #1: Hackers Exploiting Wireless Weakness Open Wireless Networks................................ ....... Captive Portal or MAC-based Authenticated WEP Encrypted ...
 
Compliance and Management Issues
Berkshire Associates Inc.
Article written by: Sonia Chapin, SPHR, CCP What is the Immigration Reform and Control Act and Who Does it Govern? The Immigration Reform and Control Act of 1986 (IRCA) makes it unlawful for an employer to hire any person who is not legally authorized to work in the U.S., and it requires employers to verify the employment eligibility of all new employees. The IRCA also prohibits discrimination ...
 
Bringing Consistency, Control and Compliance to System Management Practices
rPath
Most organizations lack sufficient transparency and control in IT operations to consistently and cost-effectively demonstrate compliance with PCI DSS, HIPAA, COBIT, Sarbanes-Oxley (SOX) and other standards and regulations. Without automated controls, organizations resort to inconsistent and largely manual processes, prone to human error and subjectivity. See how to create an automated, ...
 
10 Steps to SOX Compliance for Managed File Transfer
Coviant Software
Learn how to successfully address SOX (Sarbanes-Oxley Act) compliance for managed file transfers. First, 10 practical steps to automate your secure file transfer process are detailed. Then, the sections of SOX that relate to secure file transfer processes and how the 10 steps can meet these requirements are reviewed.
 
10 Steps to HIPAA/HTECH Compliance for Managed File Transfer
Coviant Software
Learn how to successfully address HIPAA (Healthcare Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) compliance for managed file transfers. First, 10 practical steps to automate your secure file transfer process are detailed. Then, the sections of HIPAA and HITECH that relate to secure file transfer processes and how the ...
 

IT Compliance Management Video

Snare Server Overview Symtrex, Inc.
 
Document Management- What's in it for You? ACOM Solutions, Inc.
 
IT Compliance Management Symtrex, Inc. Information

IT Compliance Management News

IT Compliance Management INetU, Inc. Information
IT Compliance Management CGI Information
Copyright © 2015, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.