Product and Services Finder

IT Compliance Management

    
<  1  2  3  4  5  6  >
IT Asset Management Group  ITAMG is a computer liquidator specializing in IT Asset Disposition, computer liquidation, hard drive shredding services, and data destruction projects of all scopes.
 
ITAMG Data Destruction Solution Data security during equipment disposition is an increasingly scrutinized process. Retired hard drives and electronic media contain sensitive information...
Microsoft IT  Microsoft IT is motivated and inspired every day by how their customers use their software to find creative solutions to business problems, develop breakthrough ideas, and stay connected to what`s most important to them.
LogPoint  LogPoint offers an advanced SIEM solution, delivering on Log Management, Compliance, Forensics, Operational Insight, Application Management, Information Security, ISO 27001, SOX, Advanced Persistent Threats, and SAP...
 
LogPoint SIEM & Log Management tool
alfabet  alfabet provides a comprehensive software suite called planningIT that supports all aspects of Business IT Management including Business Relationship Management, IT Planning, Enterprise Architecture Management, IT Finance...
 
planningIT suite alfabet's planningIT is an integrated software suite to harmonize and support the different tasks of a Business IT Management approach. All information and...
AirTight Networks  AirTight Networks delivers secure and flexible WLAN solutions embedded with the industry's top rated WIPS. Plug-and-play Wi-Fi APs and controller-less architecture eliminates the cost, complexity and inefficiencies of...
 
SpectraGuard Enterprise SpectraGuard Enterprise is a comprehensive wireless IPS and Performance Management Solution.
 
SpectraGuard Planner AirTight’s planning software designed to optimize both 802.11n infrastructure and WIPS deployment for existing or new deployments.
 
Absolute Software Corporation  Absolute Software specializes in technology and services for the management and security of mobile computers, netbooks, and smartphones. For individuals, Absolute provides peace-of-mind by physically recovering stolen...
 
Computrace Computrace products by Absolute Software allow you to track and secure devices and the data they contain, regardless if they are on or off the...
Microsoft Dynamics (formerly MBS)  Microsoft Dynamics — formerly Microsoft Business Solutions — delivers a line of products that automate and help improve financial, customer relationship, and supply chain management.
Innotas  Innotas develops Project Portfolio Management (PPM) solutions that give IT organizations everything they need to capture all the demands facing IT, select the right mix of projects, and manage resources, projects and...
Netwrix Corporation  Netwrix Croporation provides configuration auditing solutions for IT security, compliance and operations.
 
Netwrix Auditor - Configuration auditing of IT systems
 
Netwrix Freeware Tools - Free tools for IT professionals
PAETEC  PAETEC (NASDAQ GS: PAET) is personalizing communications for business-class customers across the United States. We offer a comprehensive suite of data, voice, and IP services, as well as enterprise communications...
InvGate  InvGate has developed the ultimate Web 2.0 enterprise IT Management Software. Our Service Desk and IT Asset Management framework allows organizations to gain insights about their IT infrastructure, improve system uptime,...
 
InvGate Assets IT Asset Management WEB 2.0
 
InvGate Service Desk ITIL Service Desk SAAS
Beyond Security  Vulnerability Assessment and Management network testing and Black-Box, fuzzer software testing tools that are technically sophisticated, automated and accurate.
 
AVDS - Automated Vulnerability Detection System Vulnerability Assessment and Management
ITNinja  ITNinja is a valuable resource for IT professionals looking for tips and guides on how to solve difficult IT problems. ITNinja is a forum, blog, and Q&A site where professionals can ask questions share tips and more.
<  1  2  3  4  5  6  >
More

IT Compliance Management Research Library

Compliance and Management Issues
Berkshire Associates Inc.
Article written by: Sonia Chapin, SPHR, CCP What is the Immigration Reform and Control Act and Who Does it Govern? The Immigration Reform and Control Act of 1986 (IRCA) makes it unlawful for an employer to hire any person who is not legally authorized to work in the U.S., and it requires employers to verify the employment eligibility of all new employees. The IRCA also prohibits discrimination ...
 
Bringing Consistency, Control and Compliance to System Management Practices
rPath
Most organizations lack sufficient transparency and control in IT operations to consistently and cost-effectively demonstrate compliance with PCI DSS, HIPAA, COBIT, Sarbanes-Oxley (SOX) and other standards and regulations. Without automated controls, organizations resort to inconsistent and largely manual processes, prone to human error and subjectivity. See how to create an automated, ...
 
10 Steps to SOX Compliance for Managed File Transfer
Coviant Software
Learn how to successfully address SOX (Sarbanes-Oxley Act) compliance for managed file transfers. First, 10 practical steps to automate your secure file transfer process are detailed. Then, the sections of SOX that relate to secure file transfer processes and how the 10 steps can meet these requirements are reviewed.
 
10 Steps to HIPAA/HTECH Compliance for Managed File Transfer
Coviant Software
Learn how to successfully address HIPAA (Healthcare Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) compliance for managed file transfers. First, 10 practical steps to automate your secure file transfer process are detailed. Then, the sections of HIPAA and HITECH that relate to secure file transfer processes and how the ...
 
10 Steps to PCI DSS Compliance for Managed File Transfer
Coviant Software
Learn how to successfully address PCI DSS (Payment Card Industry Data Security Standard) compliance for managed file transfers. First, 10 practical steps to automate your secure file transfer process are detailed. Then, the sections of PCI DSS v2 that relate to secure file transfer processes and how the 10 steps can meet these requirements are reviewed.
 

IT Compliance Management Video

Document Management- What's in it for You? ACOM Solutions, Inc.
 
ITAMG Onsite Hard Drive Shredding IT Asset Management Group
 
IT Compliance Management iCore Networks, Inc. Products

IT Compliance Management News

IT Compliance Management Cognitec Systems Company
Get Your Technology Company Microsite
Copyright © 2015, Questex Media Group LLC
Company descriptions and contact information are quoted from the company's website or other promotional information. Questex is not responsible for the accuracy of this information. Unless specifically noted, Questex is not sponsored by, affiliated with or otherwise connected with any of the listed companies.