compliance requirements

Results 126 - 150 of 151Sort Results By: Published Date | Title | Company Name
Published By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : 
compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management, vulnerability assessment, vulnerability, preventsys
    
Preventsys
Published By: Solidcore     Published Date: Aug 21, 2009
This white paper outlines the issues faced by IT managers in meeting their compliance requirements and explains how Solidcore can be a core component of a sustainable and cost-effective SOX compliance program.
Tags : 
sox, sox compliance, sarbox, sarbanes oxley, archiving, finance, cost control, solid core, solidcore
    
Solidcore
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security, regulatory compliance, net iq, netiq, it management
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : 
compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management, hipaa, hipaa compliance, vulnerability, vulnerabilities
    
NetIQ Corporation
Published By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : 
data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage, data replication, xiotech, data management
    
Xiotech
Published By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : 
scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance, supply chain technology, wireless technology, wireless technologies, peak, peak technologies, wireless
    
PEAK Technologies, Inc.
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals, drug, fda, electronic signature, digital signature, audit, auditing, fda, compliant, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san, storage area networks
    
TeraCloud
Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection
    
LogRhythm
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
    
IBM ILOG.
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : 
messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information
    
Symantec.cloud
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: Mimecast     Published Date: Apr 04, 2013
Enterprise information archiving is contributing to organizational needs for e-discovery and compliance requirements, and reducing primary storage costs. Gartner evaluates vendors offering products and services that provide archiving for email, files and other content types.
Tags : 
enterprise, information archiving, email, ediscory, compliance, primary storage costs, roi, storage, archiving, data
    
Mimecast
Published By: NETIQ     Published Date: Sep 09, 2013
This white paper looks at the most important elements of securing sensitive health information and meeting HIPAA compliance requirements in a scalable and cost-effective way.
Tags : 
netiq, security, hipaa, compliance, protected health information, hitech act, compliance requirements, healthcare, software development, it management
    
NETIQ
Published By: CEB     Published Date: May 19, 2014
Establishing compliance training requirements has always been difficult, but given recent changes to the regulatory and corporate work environments, the costs of failure are now more significant. To help companies get their training curricula right, CEB created a step-by-step guide to building a truly effective compliance training curriculum: one that reduces risk.
Tags : 
ceb, risk based compliance, training, reduce risk, regulatory changes, corporate work environments
    
CEB
Published By: AlienVault     Published Date: Jul 22, 2016
you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
    
AlienVault
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
When four of its hospitals needed to transition from manual to automated temperature monitoring, Allina Health sought a solution that would meet its core requirements: timely alerts to problems and automatic data capture for compliance reporting requirements. Ultimately, it was also looking for an enterprise solution that could form the standard for its entire health system. Read this case study to learn why Allina Health chose STANLEY Healthcare’s Wi-Fi-based AeroScout® Environmental Monitoring solution, including MobileView software, as its system-wide standard to build an enterprise foundation for asset tracking, environmental monitoring, and other RTLS capabilities.
Tags : 
healthcare, medicine, asset tracking, environmental monitoring, rtls, hospital
    
STANLEY Healthcare
Published By: MobileIron     Published Date: Apr 13, 2015
Enterprises around the world have been searching for a way to securely enable Android™ devices for work, but have shied away from the platform due to ongoing security and fragmentation concerns. Delayed or non-existent Android security patches, malicious app store activity, and other security gaps have led organizations to distrust the platform, particularly those in industries with tight security and compliance requirements. This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
    
MobileIron
Published By: Intralinks     Published Date: Nov 23, 2015
Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection, business technology
    
Intralinks
Published By: Thomson Reuters     Published Date: Mar 08, 2018
Many seasoned attorneys will agree that remediating an enormous amount of documentation to ensure regulatory compliance is no easy feat. The volume of repapering necessary for compliance with the new rules governing margin requirements for non-centrally cleared derivatives (UMR) presented new challenges, exposed structural weaknesses, and provided many lessons learned which can be applied to any documentation remediation effort. Many UMR initiatives suffered significant hurdles that contributed to delays and missed deadlines. Common among the various challenges faced were the dearth of talent in the quantities needed, and the limited technology and data management solutions utilized.
Tags : 
legal. umr, project, management, alsp, thomson, reuters
    
Thomson Reuters
Published By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee