compliance requirements

Results 101 - 125 of 151Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM
Published By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, data encryption, encryption, security
    
Utimaco
Published By: SilverSky     Published Date: May 09, 2014
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of SilverSky security services for their organizations.
Tags : 
silversky, economic impact, network security, security solutions, forrester research, security threats, risk-adjusted, productivity, security infrastructure, compliance, business requirements, information security, networking, security, it management
    
SilverSky
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa
    
FORTRUST
Published By: DocuSign     Published Date: Apr 24, 2018
"The healthcare industry struggles along the entire paper trail from start to finish. The current process is slow, costly, inefficient, full of errors, vulnerable to security breaches and hurts the people they are chartered to care for. Download this complimentary whitepaper and discover how DocuSign’s eSignature solutions modernize healthcare and life sciences organizations by eliminating paper and antiquated signature processes while meeting compliance requirements and reducing costs and errors. You will learn how DocuSign helps the healthcare industry to: • Reduce turnaround times for diagnostic result documents by weeks • Cut excessive administrative expenses and eliminate manual rekeying errors • Increase efficiency by eliminating time spent sending paper forms with doctors’ signatures"
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. This rule significantly expands the definition of fiduciary, spanning financial advisors as well as plan sponsors, funds, and producers who provide incentives to advisors. The rule has far-reaching impacts on business, compliance, and operations/technology and the April 2017 compliance deadline is coming up quickly. View this on-demand webinar and learn how DocuSign can help you: • Satisfy the final rule requirements by automating disclosures with a tamper-proof audit trail • Delight clients and brokers by providing a greatly improved customer experience • Meet critical DOL deadlines with rapid implementation "
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. Many firms are in the early stages of assessing the rule’s impact, sorting through legal interpretations, and preparing for regulatory compliance. To understand who’s affected, what’s changed, and the impact to your business, read the white paper to learn how DocuSign can help you digitize your document agreements and: • Satisfy compliance requirements by enabling you to automate disclosures with a tamper-proof audit trail. • Delight your customers by providing a greatly improved user experience compared to paper-based document transactions. • Meet critical deadlines with rapid implementation using DocuSign’s SaaS-based solution."
Tags : 
    
DocuSign
Published By: IBM     Published Date: Jun 22, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : 
ibm, compliance requirements, quality management tools, quality management, best practices, software development, it management, knowledge management, data management
    
IBM
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm, business technology
    
Rapid7
Published By: Quest Software     Published Date: Oct 02, 2012
Your business relies on Active Directory, so you must regularly audit and monitor it to meet security and compliance requirements. But native auditing tools can't do the job alone.
Tags : 
audit, quest, compliance, security, auditing tools, compliance requirements, active directory, business technology
    
Quest Software
Published By: CBIZ     Published Date: Aug 27, 2013
Are you prepared for health care reform? This 3-page checklist guides you through the general compliance requirements of the Affordable Care Act (ACA) to help you prepare now for 2014 and beyond. The checklist is broken down into five categories: 1. Health Plan Action Items; 2. Employer Tax Changes; 3. Fees and Filings; 4. Shared Responsibility Employer Preparation; and 5. ACA Provisions beyond 2014.
Tags : 
health care reform, health reform checklist, affordable care act, aca, shared responsibility, grandfathered, waiting period, summary of benefits and coverage, filing for erisa, preexisting conditions, annual limits, advance notice, mlr rebate, exchange, medicare witholding, pcori, transitional reinsurance fee, fsa plan documents, benefit plan review, public marketplace
    
CBIZ
Published By: EarthLink Business     Published Date: May 15, 2014
This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).
Tags : 
earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
EarthLink Business
Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa
    
FORTRUST
Published By: IBM     Published Date: Feb 11, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : 
quality management approaches, compliance requirements, health sector, regulatory requirements, risk management, knowledge management, enterprise applications
    
IBM
Published By: Symantec     Published Date: Nov 30, 2015
Website security is important for every business that has an online presence, but different companies have different needs and compliance requirements.
Tags : 
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Demonstrating compliance with PCI DSS is far from a trivial exercise. Those 12 requirements often translate into a lot of manual and labor-intensive tasks, along with the need to access data and reports from many different systems and tools. Watch this technical demo to learn how AlienVault can simplify PCI DSS compliance and improve your overall security posture. You'll learn: • Common PCI DSS compliance challenges • Questions to ask as you plan and prepare • Core capabilities needed to demonstrate compliance • How AlienVault Unified Security Management simplifies compliance
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10, a10 networks, sox compliance, it management
    
A10 Networks
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee