Product and Services Finder

IT Compliance Management

<  1  2  3  4  5  6  >
CobbleSoft International Ltd  CobbleSoft is an innovator and pioneer of web-based, self-service helpdesk and service management collaboration solutions. Established in 2002, clients encompasses small businesses to Fortune 500 and Global 2000...
CobbleSoft Connect COIGN Enterprise is helpdesk and service management with active data warehousing and intelligent workflow for business process management, plus full...
Symtrex, Inc.  Symtrex Inc., Network Security Specialists, including Log Management, vulnerability assessments, endpoint protection and perimeter security
Kaspersky Total Business Solutions Kaspersky Total Business
Snare Enterprise Agent - Epilog for Windows Snare Enterprise Agent - Epilog for Windows
IT Asset Management Group  ITAMG is a computer liquidator specializing in IT Asset Disposition, computer liquidation, hard drive shredding services, and data destruction projects of all scopes.
ITAMG Data Destruction Solution Data security during equipment disposition is an increasingly scrutinized process. Retired hard drives and electronic media contain sensitive information...
Microsoft IT  Microsoft IT is motivated and inspired every day by how their customers use their software to find creative solutions to business problems, develop breakthrough ideas, and stay connected to what`s most important to them.
LogPoint  LogPoint offers an advanced SIEM solution, delivering on Log Management, Compliance, Forensics, Operational Insight, Application Management, Information Security, ISO 27001, SOX, Advanced Persistent Threats, and SAP...
LogPoint SIEM & Log Management tool
Honeywell International Inc.  Honeywell is a Fortune 100 company that invents and manufactures technologies to address tough challenges linked to global macrotrends such as safety, security, and energy. With approximately 122,000 employees worldwide,...
alfabet  alfabet provides a comprehensive software suite called planningIT that supports all aspects of Business IT Management including Business Relationship Management, IT Planning, Enterprise Architecture Management, IT Finance...
planningIT suite alfabet's planningIT is an integrated software suite to harmonize and support the different tasks of a Business IT Management approach. All information and...
Beyond Security  Vulnerability Assessment and Management network testing and Black-Box, fuzzer software testing tools that are technically sophisticated, automated and accurate.
AVDS - Automated Vulnerability Detection System Vulnerability Assessment and Management
Arizona Hosted Services LLC  Managed IT services and hosted software support for small business enviromets
Managed IT Services Managed IT Services for small businesses
Tango/04 Computing Group  Tango/04 develops systems management, monitoring, security, BSM and performance management software.
VISUAL Control Center Now, IT departments can control from the same easy to use graphical interface, the vital signs of any number and combination of iSeries and Windows servers...
Visual Message Center VISUAL Message Center, Tango/04's suite of products for the management of IT infrastructure, provides a technological foundation for the development of...
AirTight Networks  AirTight Networks delivers secure and flexible WLAN solutions embedded with the industry's top rated WIPS. Plug-and-play Wi-Fi APs and controller-less architecture eliminates the cost, complexity and inefficiencies of...
SpectraGuard Enterprise SpectraGuard Enterprise is a comprehensive wireless IPS and Performance Management Solution.
SpectraGuard Planner AirTight’s planning software designed to optimize both 802.11n infrastructure and WIPS deployment for existing or new deployments.
conaq  IT-Benchmarking, IT-Outsourcing, Restructuring IT, IT-Consulting, ITIMS, ITIMS-Benchmark, AMBI, Unternehmensberatung, Best Practices
IT-Consulting IT-Service Management, ITIL, etc.
IT-Restructuring Restructuring IT-Services, etc.
Accenture Business Services  The history of Accenture Business Services for Utilities is a fascinating one, distinguished by the imagination and foresight of multiple key players. Officially launched April 1, 2003, Accenture Business Services for...
<  1  2  3  4  5  6  >

IT Compliance Management Research Library

Kaspersky Special Report - No Business is Safe from Cyberespionage
Symtrex, Inc.
High-profile targeted attacks on enterprises are becoming increasingly widespread. Thousands of businesses have already been hacked and had their sensitive data stolen – resulting in multi-billion dollar losses. Cyberespionage is a tangible and growing global threat today – and fighting it is one of the principal tasks we’ve set ourselves.
5 Attributes of a Successful IT Asset Disposition Program
IT Asset Management Group
5 Attributes of a Successful IT Asset Disposition Program Government agencies, corporations, and various institutions are taking measures to improve IT asset management and disposition practices in order to mitigate risk of a data breach, achieve environmental initiatives, and ensure optimal financial performance. The following are some key pieces to building a secure and efficient IT disposal ...
Compliance and Management Issues
Berkshire Associates Inc.
Article written by: Sonia Chapin, SPHR, CCP What is the Immigration Reform and Control Act and Who Does it Govern? The Immigration Reform and Control Act of 1986 (IRCA) makes it unlawful for an employer to hire any person who is not legally authorized to work in the U.S., and it requires employers to verify the employment eligibility of all new employees. The IRCA also prohibits discrimination ...
Bringing Consistency, Control and Compliance to System Management Practices
Most organizations lack sufficient transparency and control in IT operations to consistently and cost-effectively demonstrate compliance with PCI DSS, HIPAA, COBIT, Sarbanes-Oxley (SOX) and other standards and regulations. Without automated controls, organizations resort to inconsistent and largely manual processes, prone to human error and subjectivity. See how to create an automated, ...
10 Steps to SOX Compliance for Managed File Transfer
Coviant Software
Learn how to successfully address SOX (Sarbanes-Oxley Act) compliance for managed file transfers. First, 10 practical steps to automate your secure file transfer process are detailed. Then, the sections of SOX that relate to secure file transfer processes and how the 10 steps can meet these requirements are reviewed.

IT Compliance Management Video

ITAMG Onsite Hard Drive Shredding IT Asset Management Group
Snare Server Overview Symtrex, Inc.
IT Compliance Management IT Asset Management Group Technology

IT Compliance Management News

IT Compliance Management Fiserv Inc Company
IT Compliance Management Netsize Products
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.