Product and Services Finder

IT Compliance Management

    
<  1  2  3  4  5  6  >
Symtrex, Inc.  Symtrex Inc., Network Security Specialists, including Log Management, vulnerability assessments, endpoint protection and perimeter security
 
Kaspersky Total Business Solutions Kaspersky Total Business
 
Snare Enterprise Agent - Epilog for Windows Snare Enterprise Agent - Epilog for Windows
 
IT Asset Management Group  ITAMG is a computer liquidator specializing in IT Asset Disposition, computer liquidation, hard drive shredding services, and data destruction projects of all scopes.
 
ITAMG Data Destruction Solution Data security during equipment disposition is an increasingly scrutinized process. Retired hard drives and electronic media contain sensitive information...
Microsoft IT  Microsoft IT is motivated and inspired every day by how their customers use their software to find creative solutions to business problems, develop breakthrough ideas, and stay connected to what`s most important to them.
LogPoint  LogPoint offers an advanced SIEM solution, delivering on Log Management, Compliance, Forensics, Operational Insight, Application Management, Information Security, ISO 27001, SOX, Advanced Persistent Threats, and SAP...
 
LogPoint SIEM & Log Management tool
Honeywell International Inc.  Honeywell is a Fortune 100 company that invents and manufactures technologies to address tough challenges linked to global macrotrends such as safety, security, and energy. With approximately 122,000 employees worldwide,...
alfabet  alfabet provides a comprehensive software suite called planningIT that supports all aspects of Business IT Management including Business Relationship Management, IT Planning, Enterprise Architecture Management, IT Finance...
 
planningIT suite alfabet's planningIT is an integrated software suite to harmonize and support the different tasks of a Business IT Management approach. All information and...
Qoppa Software  Java PDF Libraries and Tools to view, print, manipulate PDF documents; Java PDF api; Android PDF api; PDF automation; PDF print; PDF convert; PDF image extract/convert; PDF security digital signature; PDF form merge; PDF...
 
jPDFNotes Java PDF Notes Bean
 
PDF Automation Server PDF workflow server
 
HUB Technical Services, LLC  HUB Technical Services, LLC. is a MA state approved ITS43 IT service and solution provider based in South Easton, Massachusetts.
NRX Global Inc  NRX Global Inc. is the global market leader in Asset Lifecycle Information Management (ALIM) software, headquartered in Toronto Canada. It has offices in Australia, Canada, China, Europe, Latin America, the Middle East...
Ionx Solutions LLP  Ionx provides file integrity monitoring software for increased security and compliance
 
Verisys Verisys is an advanced system and file integrity monitoring solution for Windows that allows you to maintain the integrity of business critical files and...
BLADE Network Technologies, Inc an IBM Company  BLADE Network Technologies (BLADE), the data center switching company, brings speed and intelligence to the network edge; closer to customers’ business, users and innovations. With over 9 million ports installed, BLADE’s...
Honore Consulting Inc  Honore Consulting offerings include: assessment services, installation services, Cyber Security , configuration services, migration services, consolidation and virtualization services as well as integration and...
Optrics Engineering  Optrics is a leading-edge network integrator, consultant and I.T. solutions advisor. We offer professionally-licensed and certified IT staff specializing in network design and network-specific software and hardware...
 
FortiScan FortiScan provides an enterprise-scale solution that integrates endpoint vulnerability management, industry and federal compliance, patch management,...
 
ManaeEngine EventLog Analyzer EventLog Analyzer is a web based, real time, agent less, event log and application log monitoring and management software. The event log analyser software...
 
<  1  2  3  4  5  6  >
More

IT Compliance Management Research Library

HealthCare Buyers Guide: Mobile Device Management
Symtrex, Inc.
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient patient care. But mobile devices also present a risk to PHI. How do you enable secure access from mobile devices without hindering doctors on the job? In this guide we walk you through the ...
 
ITAMG Tips for Liquidation and Inventory Template
IT Asset Management Group
Download the inventory template today in order to receive the highest return on your surplus IT equipment. Taking an accurate inventory is the first step to maximizing the value of excess IT equipment. ITAMG has developed a template to ensure our clients capture the most important data for generating accurate quotes. The template will guide you to: Collect model and part numbers ...
 
Compliance and Management Issues
Berkshire Associates Inc.
Article written by: Sonia Chapin, SPHR, CCP What is the Immigration Reform and Control Act and Who Does it Govern? The Immigration Reform and Control Act of 1986 (IRCA) makes it unlawful for an employer to hire any person who is not legally authorized to work in the U.S., and it requires employers to verify the employment eligibility of all new employees. The IRCA also prohibits discrimination ...
 
Bringing Consistency, Control and Compliance to System Management Practices
rPath
Most organizations lack sufficient transparency and control in IT operations to consistently and cost-effectively demonstrate compliance with PCI DSS, HIPAA, COBIT, Sarbanes-Oxley (SOX) and other standards and regulations. Without automated controls, organizations resort to inconsistent and largely manual processes, prone to human error and subjectivity. See how to create an automated, ...
 
10 Steps to SOX Compliance for Managed File Transfer
Coviant Software
Learn how to successfully address SOX (Sarbanes-Oxley Act) compliance for managed file transfers. First, 10 practical steps to automate your secure file transfer process are detailed. Then, the sections of SOX that relate to secure file transfer processes and how the 10 steps can meet these requirements are reviewed.
 

IT Compliance Management Video

ITAMG Onsite Hard Drive Shredding IT Asset Management Group
 
Sophos Next Generation Firewall Symtrex, Inc.
 
IT Compliance Management Symtrex, Inc. Products

IT Compliance Management News

IT Compliance Management CGI Information
IT Compliance Management iCore Networks, Inc. Technology
Copyright © 2014, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.