FDA 21 CFR 11 White Papers

(View All Report Types)
FlexNet and FDA 21 CFR Part 11
sponsored by Apriso Corporation
WHITE PAPER: Manufacturers regulated by the FDA 21 CFR Part 11 regulations understand that the integrity of manufacturing processes must be achieved and maintained in order to sustain compliance. The purpose of this document is to demonstrate that Apriso FlexNet platform and application suite can support the intent of the 21 CFR Part 11 regulatory guidelines.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Apriso Corporation

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

7 Reasons Businesses are Shifting to Cloud Backup
sponsored by CoreVault
WHITE PAPER: Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

CoreVault

Demand More From Your Data Center Environment
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a colocation strategy that offers more than just space and power to help you optimize your data center operations, achieve compliant IT security, and more.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Business Driven Governance: Managing Policies for Data Retention
sponsored by IBM
WHITE PAPER: This resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
Posted: 27 Feb 2014 | Published: 31 Aug 2013

IBM

IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

Smarter Customers, Smarter Commerce: Innovations in the Banking Industry
sponsored by IBM
WHITE PAPER: Banks today must reassess their business models and focus more on efficiency, data collection and risk management in order to stay competitive. Uncover a unique framework that can help meet your business objectives and allow for better data management in the highly regulated financial industry.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

IBM

How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 30 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM

Leading Pharmaceutical Company Reduces Costs to Meet CFR Compliance Through Digital Signature Implementation
sponsored by Hexaware Technologies
CASE STUDY: In this brief case study, discover eSignature's method of capturing electronic signatures at appropriate points in the work flows, storing relevant information, and enabling an audit trail to be retrieved for each applicable asset.
Posted: 31 Oct 2011 | Published: 27 Oct 2011

Hexaware Technologies

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.

Safety First Breaking Down the FDA's 2023 Premarket Cybersecurity Requirements
sponsored by Cybellum
EBOOK: To deepen your understanding of the FDA’s pre-market cybersecurity requirements for medical devices, take a look through this 23-page e-book.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET
Cybellum

Storage Systems & Storage Management Track: Right-sizing Primary Data
sponsored by 3PAR
PRESENTATION TRANSCRIPT: Most companies allow far too much data to reside on expensive primary storage. In this presentation transcript, Anne Skamarock Research Director, FOCUS, discusses the most effective methods for reducing and managing the data footprint on primary storage -- including tools and techniques.
Posted: 19 Aug 2009 | Published: 01 Aug 2009

3PAR

Building an integrated workflow for quality control and compliance
sponsored by Apriso Corporation
EBOOK: This eBook explains the technical and organizational issues involved in creating fully integrated quality control and data management systems for globalized manufacturers and distributors.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

Apriso Corporation

Pulse E-Zine: Managing BYOD and Security
sponsored by TechTarget Health IT
EZINE: The quarterly Pulse e-zine delves into a range of issues affecting hospitals, doctors, payers, policymakers and other industry stakeholders. Explore the hottest topics that impact IT decision makers today and gain knowledge from peers through snapshots of trends, SearchHealthIT industry research and our on-location conference coverage.
Posted: 15 May 2013 | Published: 15 May 2013

TechTarget Health IT

2023 Medical Device Security Survey Report
sponsored by Cybellum
RESEARCH CONTENT: Modern medical devices are evolving rapidly. But with the adoption of increasingly software-driven approaches, staying ahead of cyberthreats has become even more challenging. This report presents the findings of a survey conducted with the aid of 150 full-time employees from the medical device manufacturing industry. Read on to learn more.
Posted: 03 Jan 2024 | Published: 03 Jan 2024

TOPICS:  .NET
Cybellum

The SOX Effect
sponsored by TechTarget Security
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

TechTarget Security

Complying With NIS2 A Product Security Perspective
sponsored by Cybellum
WHITE PAPER: The NIS2 is an advancement of the EU’s cybersecurity framework building upon the initial Network and Information Security (NIS) Directive, including specific sections relevant to product security professionals. Use this white paper as a reference to better understand the NIS2 with regards to product security.
Posted: 04 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Cybellum

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Don't let the cloud be the weak link in your security chain. Find out what you need to know to choose the best vendor.
Posted: 09 Mar 2015 | Published: 09 Mar 2015

TOPICS:  IT Management
Oracle Corporation

What CEOs Need to Know in 2024
sponsored by The Advisory Board
RESEARCH CONTENT: Americans are seeing worsening health outcomes, higher overall health spending, declining patient satisfaction, and burnt-out clinicians. This report will explain these recently accelerating shifts and empower executives to make strategic bets about their businesses today that set them up for long-term success. Download your copy to learn more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET
The Advisory Board

The State of Software Supply Chain Security 2024
sponsored by ReversingLabs
RESEARCH CONTENT: Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

TOPICS:  .NET
ReversingLabs

Why Disaster Recovery Preparation Pays Off
sponsored by DellEMC and Intel®
EGUIDE: To protect your organization during unplanned downtime, you must have effective disaster recovery (DR) and business continuity (BC) plans in place. This expert e-guide provides best practices for creating a comprehensive DR strategy and discusses why contingent controls are a vital - yet overlooked - part of DR and BC.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

DellEMC and Intel®

Information Security Magazine: “Health Care Data Protection”
sponsored by Information Security Magazine
EGUIDE: This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

Information Security Magazine

Data Analytics in Healthcare: Opportunities & Challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.
Posted: 08 Feb 2021 | Published: 25 Feb 2020

TechTarget ComputerWeekly.com

Presentation Transcript: The Efficient Next Gen Datacenter: Doing More with Less
sponsored by HP, Intel and Oracle
PRESENTATION TRANSCRIPT: Read this Presentation Transcript to learn how to build a dynamic IT infrastructure and pro-actively manage your data center.
Posted: 07 Apr 2009 | Published: 07 Apr 2009

HP, Intel and Oracle

How do Iconic Business Models such as Airbnb Emerge?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
Posted: 08 Feb 2021 | Published: 16 Mar 2016

TechTarget ComputerWeekly.com

Storage Virtualization Strategies for Health Care
sponsored by TechTarget Health IT and TechTarget Storage
EZINE: Using EHRs means that terabytes of patient records must be stored for decades at a time. Doing this without breaking the bank means deciding which storage approach is right for your healthcare facility. Inside this exclusive e-zine, learn about a variety of storage strategies, including tiered storage, thin provisioning and data replication.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

All resources sponsored by TechTarget Health IT and TechTarget Storage

Revamping and optimizing your SAP GRC strategy
sponsored by Security Weaver
EBOOK: GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Email Archiving Seminar Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: Two sessions are included in this presentation download covering such subjects as why an organisation should archive their email and practical advice on how to get started. Download it now for more information on the benefits of e-mail archiving.
Posted: 07 Jul 2009 | Published: 02 Jul 2009

EMC Backup and Recovery Solutions

Global Risks Report 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 08 Feb 2021 | Published: 13 Jan 2017

TechTarget ComputerWeekly.com

A Global Look at Emerging Regulatory Frameworks for AI Governance
sponsored by Dataiku
EBOOK: AI at scale is the end goal for many organizations. However, the uncertainty of future regulation and potential for risk - especially when it comes to Generative AI - presents challenges. This e-book unpacks how you can scale AI with ease by implementing AI governance best practices that will withstand the test of new regulations.
Posted: 01 May 2024 | Published: 01 May 2024

TOPICS:  .NET
Dataiku

Information Security Magazine
sponsored by TechTarget Security
EGUIDE: In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

TechTarget Security

Cloud Risk Management: Governance Strategies to Protect Digital Assets
sponsored by TechTarget Security
EBOOK: In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Security