FDA 21 CFR 11 White Papers

(View All Report Types)
FlexNet and FDA 21 CFR Part 11
sponsored by Apriso Corporation
WHITE PAPER: Manufacturers regulated by the FDA 21 CFR Part 11 regulations understand that the integrity of manufacturing processes must be achieved and maintained in order to sustain compliance. The purpose of this document is to demonstrate that Apriso FlexNet platform and application suite can support the intent of the 21 CFR Part 11 regulatory guidelines.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Apriso Corporation

Tripwire IT Security & Compliance Automation Solutions –Empowering IT Security in an Insecure World
sponsored by Tripwire, Inc.
WHITE PAPER: In this solution brief, discover how Tripwire IT security and compliance automation solutions provides the visibility, intelligence and automation of IT security controls needed to gain confidence in the protection of your data.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Windows 7 and Desktop Lockdown with Privilege Management
sponsored by Viewfinity
WHITE PAPER: With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to re-assess their approach to PC lockdown.  Viewfinity Privilege Management allows IT professionals to provide granular, multi-level user permission control for least privilege environments.
Posted: 04 Nov 2010 | Published: 03 Nov 2010

Viewfinity

The ROI of a New Learning Management System (LMS): How to Construct a Successful Business Case
sponsored by SuccessFactors
WHITE PAPER: This resource describes key features and capabilities of a new-generation learning management system (LMS), and counts down six steps for demonstrating LMS value, rooted in ROI. Learn how you can make a successful business case for an LMS by reading on now.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

SuccessFactors

Virtual and Superior: How to Build Teams that Get Things Done
sponsored by Citrix
WHITE PAPER: This white paper highlights tips and best practices for CIOs looking for more effective ways to cut risk and create value in virtual environments through better teamwork.
Posted: 12 Sep 2012 | Published: 12 Sep 2012

Citrix

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

GeoTrust, Inc.

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Enabling Continuous Compliance Across the Enterprise
sponsored by IBM
WHITE PAPER: Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

Leading Pharmaceutical Company Reduces Costs to Meet CFR Compliance Through Digital Signature Implementation
sponsored by Hexaware Technologies
CASE STUDY: In this brief case study, discover eSignature's method of capturing electronic signatures at appropriate points in the work flows, storing relevant information, and enabling an audit trail to be retrieved for each applicable asset.
Posted: 31 Oct 2011 | Published: 27 Oct 2011

Hexaware Technologies

Safety First Breaking Down the FDA's 2023 Premarket Cybersecurity Requirements
sponsored by Cybellum
EBOOK: To deepen your understanding of the FDA’s pre-market cybersecurity requirements for medical devices, take a look through this 23-page e-book.
Posted: 06 Feb 2024 | Published: 06 Feb 2024

TOPICS:  .NET
Cybellum

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.

Storage Systems & Storage Management Track: Right-sizing Primary Data
sponsored by 3PAR
PRESENTATION TRANSCRIPT: Most companies allow far too much data to reside on expensive primary storage. In this presentation transcript, Anne Skamarock Research Director, FOCUS, discusses the most effective methods for reducing and managing the data footprint on primary storage -- including tools and techniques.
Posted: 19 Aug 2009 | Published: 01 Aug 2009

3PAR

Building an integrated workflow for quality control and compliance
sponsored by Apriso Corporation
EBOOK: This eBook explains the technical and organizational issues involved in creating fully integrated quality control and data management systems for globalized manufacturers and distributors.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

Apriso Corporation

Pulse E-Zine: Managing BYOD and Security
sponsored by TechTarget Health IT
EZINE: The quarterly Pulse e-zine delves into a range of issues affecting hospitals, doctors, payers, policymakers and other industry stakeholders. Explore the hottest topics that impact IT decision makers today and gain knowledge from peers through snapshots of trends, SearchHealthIT industry research and our on-location conference coverage.
Posted: 15 May 2013 | Published: 15 May 2013

TechTarget Health IT

2023 Medical Device Security Survey Report
sponsored by Cybellum
RESEARCH CONTENT: Modern medical devices are evolving rapidly. But with the adoption of increasingly software-driven approaches, staying ahead of cyberthreats has become even more challenging. This report presents the findings of a survey conducted with the aid of 150 full-time employees from the medical device manufacturing industry. Read on to learn more.
Posted: 03 Jan 2024 | Published: 03 Jan 2024

TOPICS:  .NET
Cybellum

The SOX Effect
sponsored by TechTarget Security
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

TechTarget Security

Complying With NIS2 A Product Security Perspective
sponsored by Cybellum
WHITE PAPER: The NIS2 is an advancement of the EU’s cybersecurity framework building upon the initial Network and Information Security (NIS) Directive, including specific sections relevant to product security professionals. Use this white paper as a reference to better understand the NIS2 with regards to product security.
Posted: 04 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Cybellum

Top 5 Aspects of Security to Look for in a Cloud Provider
sponsored by Oracle Corporation
WHITE PAPER: Don't let the cloud be the weak link in your security chain. Find out what you need to know to choose the best vendor.
Posted: 09 Mar 2015 | Published: 09 Mar 2015

TOPICS:  IT Management
Oracle Corporation

What CEOs Need to Know in 2024
sponsored by The Advisory Board
RESEARCH CONTENT: Americans are seeing worsening health outcomes, higher overall health spending, declining patient satisfaction, and burnt-out clinicians. This report will explain these recently accelerating shifts and empower executives to make strategic bets about their businesses today that set them up for long-term success. Download your copy to learn more.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET
The Advisory Board

The State of Software Supply Chain Security 2024
sponsored by ReversingLabs
RESEARCH CONTENT: Over the last 3 years, supply chain attacks rose 1300%. This report is designed to give readers a map with which they can navigate the landscape of software supply chain security, exploring some of the high-level trends in software supply chain threats and how recent attacks provide insight into what’s to come. Read on to learn more.
Posted: 22 Feb 2024 | Published: 22 Feb 2024

TOPICS:  .NET
ReversingLabs

Why Disaster Recovery Preparation Pays Off
sponsored by DellEMC and Intel®
EGUIDE: To protect your organization during unplanned downtime, you must have effective disaster recovery (DR) and business continuity (BC) plans in place. This expert e-guide provides best practices for creating a comprehensive DR strategy and discusses why contingent controls are a vital - yet overlooked - part of DR and BC.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

DellEMC and Intel®

Information Security Magazine: “Health Care Data Protection”
sponsored by Information Security Magazine
EGUIDE: This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

Information Security Magazine

Data Analytics in Healthcare: Opportunities & Challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.
Posted: 08 Feb 2021 | Published: 25 Feb 2020

TechTarget ComputerWeekly.com

Presentation Transcript: The Efficient Next Gen Datacenter: Doing More with Less
sponsored by HP, Intel and Oracle
PRESENTATION TRANSCRIPT: Read this Presentation Transcript to learn how to build a dynamic IT infrastructure and pro-actively manage your data center.
Posted: 07 Apr 2009 | Published: 07 Apr 2009

HP, Intel and Oracle

Storage Virtualization Strategies for Health Care
sponsored by TechTarget Health IT and TechTarget Storage
EZINE: Using EHRs means that terabytes of patient records must be stored for decades at a time. Doing this without breaking the bank means deciding which storage approach is right for your healthcare facility. Inside this exclusive e-zine, learn about a variety of storage strategies, including tiered storage, thin provisioning and data replication.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

All resources sponsored by TechTarget Health IT and TechTarget Storage

How do Iconic Business Models such as Airbnb Emerge?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Brands such as Airbnb disrupt industries and change how consumers think about the market, according to this research from Cass Business School, City University London.
Posted: 08 Feb 2021 | Published: 16 Mar 2016

TechTarget ComputerWeekly.com

Revamping and optimizing your SAP GRC strategy
sponsored by Security Weaver
EBOOK: GRC is by now a well-known concept but processes for keeping track of it are still in the nascent stages at some companies, with many companies still using Excel or SharePoint for reporting purposes. Get advice on how to get started with GRC software within the SAP landscape, and how to use the software to achieve a successful compliance strategy.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver

Email Archiving Seminar Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: Two sessions are included in this presentation download covering such subjects as why an organisation should archive their email and practical advice on how to get started. Download it now for more information on the benefits of e-mail archiving.
Posted: 07 Jul 2009 | Published: 02 Jul 2009

EMC Backup and Recovery Solutions

Global Risks Report 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 08 Feb 2021 | Published: 13 Jan 2017

TechTarget ComputerWeekly.com

Information Security Magazine
sponsored by TechTarget Security
EGUIDE: In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

TechTarget Security

A Global Look at Emerging Regulatory Frameworks for AI Governance
sponsored by Dataiku
EBOOK: AI at scale is the end goal for many organizations. However, the uncertainty of future regulation and potential for risk - especially when it comes to Generative AI - presents challenges. This e-book unpacks how you can scale AI with ease by implementing AI governance best practices that will withstand the test of new regulations.
Posted: 01 May 2024 | Published: 01 May 2024

TOPICS:  .NET
Dataiku

Cloud Risk Management: Governance Strategies to Protect Digital Assets
sponsored by TechTarget Security
EBOOK: In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

TechTarget Security