compliance

Results 1951 - 1975 of 1977Sort Results By: Published Date | Title | Company Name
Published By: Xiotech     Published Date: Mar 01, 2007
Many organizations have no policies in place for retaining, managing, and purging documents. This paper looks at some of the basic components of a document strategy—retention, management, and destruction—and highlights some of the current compliance drivers that make it all necessary.
Tags : 
archive management, email archiving, email archive, data warehousing, compliance, data retention, xiotech
    
Xiotech
Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection
    
Secure Computing
Published By: Infor     Published Date: Feb 27, 2007
In today's process manufacturing environment, innovation is viewed as critical to sustainable growth and profitability. While open innovation is regarded as the answer, few companies can effectively measure the return on R&D investment, have acceptable product success rates, achieve acceptable promotional effectiveness, or have visibility into their compliance risks or operational readiness for new product launches.
Tags : 
collaboration, return on investment, holistic, process manufacturing, manufacturing, supply chain management, scm, product lifecycle management
    
Infor
Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management
    
Nemx Software Corporation
Published By: LANDesk     Published Date: Feb 12, 2007
This paper shows how LANDesk Process Manager can allow you to design processes once, automate them everywhere and refine them as needed - saving money, ensuring compliance and keeping even the most complex processes running reliably.
Tags : 
it management, productivity, change management, project management, groupware workflow, automating it, it automation, process management
    
LANDesk
Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management, information security, physical security, holistic
    
RiskWatch
Published By: RiskWatch     Published Date: Feb 05, 2007
As corporate security policies and compliance regulations are created to address the increasingly dangerous post 9/11 environment, security risk management is becoming an increasingly important tool in corporate governance. Learn more in this white paper by RiskWatch.
Tags : 
network security, security, compliance, glba, hipaa, risk assessment, risk management, hipaa compliance
    
RiskWatch
Published By: TSFactory     Published Date: Jan 29, 2007
In lieu of Sarbanes-Oxley, HIPAA, and other regulations, one of the main concerns in the IT industry today is security. In this white paper, we take a deeper look at the security concerns, the available solutions, their drawbacks, and a new complementary way of addressing today's security issues.
Tags : 
auditing, windows, compliance, tsfactory, sarbanes-oxley, sox, audit, ts factory
    
TSFactory
Published By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : 
risk assessment, compliance assessment, risk management, security, it management, security management, infrastructure, vulnerability
    
RiskWatch
Published By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : 
spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance
    
8e6 Technologies
Published By: IBM     Published Date: Dec 12, 2006
This white paper outlines the components of the Banking Data Warehouse (BDW) and how they assist financial institutions in addressing the data modeling and data consolidation issues relating to the SOX regulations.
Tags : 
data warehousing, database warehousing, data consolidation, sarbanes oxley compliance, sox, compliance, banking, bdw
    
IBM
Published By: IBM     Published Date: Dec 12, 2006
This white paper will examine the potential of a technological breakthrough to reduce trust-based risks and change the way organizations reach a harmonious balance between consumer privacy and information sharing.
Tags : 
identity management, compliance, knowledge management, contact management, information management, privacy, customer privacy, privacy policy
    
IBM
Published By: IBM     Published Date: Dec 12, 2006
This white paper will outline the components of the Banking Data Warehouse (BDW) and how they assist financial institutions to address the data modeling and data consolidation issues relating to the Basel II Capital Accord. 
Tags : 
data warehousing, bdw, banking data warehousing, compliance, risk management, basel ii, ibm
    
IBM
Published By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes some easy-to-use data management tools that many companies are using to let business users do complex data updates and reporting tasks effortlessly. This technology is not only easing their Sarbanes-Oxley compliance, but is also saving these companies large amounts of time and money.
Tags : 
compliance, sox, sarbanes, sarbox, sarbanes-oxley, sarbanes oxley, data management, cost control
    
Winshuttle
Published By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : 
application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : 
identity theft, application security, password management, security management, compliance, california sb 1386, senate bill 1386, ab 1950
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance
    
Cenzic
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security
    
NetIQ Corporation
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
If you are spending too much time and money on SOX compliance, this white paper will help you identify where investments in technology could really pay off in time for your next SOX audit.
Tags : 
compliance, sarbox, sox, sarbanes oxley, sarbanes-oxley, sox compliance, sox audit, change management
    
SoftLanding Systems
Published By: KACE     Published Date: Nov 14, 2006
How is HIPAA Security Rule compliance impacting your IT department?  This paper explores some solutions.
Tags : 
hipaa, compliance, hipaa compliance, healthcare, privacy, confidentiality, kace
    
KACE
Published By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : 
backup, backup and recovery, disaster recovery, compliance, data protection, encryption, access control, backup exec
    
Symantec
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing
    
Aomega
Published By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : 
hipaa compliance, ip faxing, ip networks, records management, information management, data protection, privacy, security policies
    
Castelle
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency
    
Secure Computing
Start   Previous    66 67 68 69 70 71 72 73 74 75 76 77 78 79 80    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: