compliance

Results 1726 - 1750 of 1975Sort Results By: Published Date | Title | Company Name

Vulnerability Management 101: What’s a Risk and How Can I Mitigate as Many as Possible?

Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
    
Perimeter

Securing Cardholder Data So You Don't Make Headlines

Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 1

Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Configuration Management and Documentation to Meet Federal IT Compliance Mandates

Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance
    
Ecora Software

Understanding and Managing Security Audits

Published By: Ecora Software     Published Date: Aug 15, 2007
Better preparation means better results – Learn how to prepare for an audit; how to develop a self-audit process; how to develop a security template; and much more.
Tags : 
security audit, audit, auditing, vulnerability assessment, vulnerability management, infrastructure, patch, patch management
    
Ecora Software

Achieving Sustainable IT Compliance to 21 CFR Part 11

Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals
    
Ecora Software

Practical Guide to Implementing HIPAA IT Security Standards

Published By: Ecora Software     Published Date: Aug 15, 2007
Do you need to implement corporate policies regarding security and confidential health information? Learn: How to use IT documentation to prepare for and pass Security audits; What IT data is critical for Security Standards; What is the difference between Security and IT Audits. You can implement a sustainable HIPAA Security Standard – Read this paper to learn more.
Tags : 
hipaa, hippa, health care, healthcare, compliance, privacy, consumer data, data privacy
    
Ecora Software

Practical Guide to Sarbanes-Oxley Compliance

Published By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
    
Ecora Software

Sustaining Sarbanes-Oxley IT Internal Controls

Published By: Ecora Software     Published Date: Aug 15, 2007
Our guide shows you how automation can create a sustainable control and reporting system – a must-have with mandated quarterly and annual assessments. If you've already prepared for, and experienced, your first Sarbanes-Oxley audit, you'll want to read this guide on sustainability.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
    
Ecora Software

Automating Change Management for Security, Compliance, Stability and Sanity!

Published By: Ecora Software     Published Date: Aug 15, 2007
Learn the importance of change management in today's complex IT infrastructures.
Tags : 
change management, configuration management, it management, project management, compliance, compliant, audit, auditing
    
Ecora Software

A Strategic Approach to Gramm-Leach-Bliley Act Compliance

Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management
    
Ecora Software

Practical Guide to Understanding and Complying with the Gramm-Leach-Bliley Act

Published By: Ecora Software     Published Date: Aug 15, 2007
A summary of the background of GLBA, the precedents it sets for securing nonpublic consumer information, and the responsibilities it places on senior management and IT departments to ensure customer data is safeguarded.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 4

Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 3

Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 2

Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Top 10 Keys to Gaining Enterprise Configuration Visibility

Published By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : 
configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil
    
Ecora Software

Future-Proof Your Compliance Using BPM

Published By: Ultimus     Published Date: Aug 16, 2007
A BPM-based compliance solution is the most efficient and flexible way to optimize and future-proof your compliance investment to create long term business value.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
    
Ultimus

How to Leverage Quality Management for Regulatory Compliance

Published By: Interactive Intelligence     Published Date: Feb 26, 2013
In today's regulations and risk management, business has become increasingly complex, and penalties are growing. Managing risk must therefore include monitoring the actions of your entire organization and more. Read on to learn more about compliance.
Tags : 
quality management, regulatory compliance, risk management, complex risk, monitoring actions, data management, business technology
    
Interactive Intelligence

8 Tips for Outbound Calling Compliance for the Debt Collection Industry

Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Representatives from the debt collection industry make billions of contacts with consumers on behalf of creditors every year. With compliance being necessary -- this paper will explore critical sites of outbound calling compliance.
Tags : 
outbound calling, calling compliance, fdcpa, debt collection industry, compliance tips and suggestions, hot button issues, interactive intelligence, knowledge management
    
Interactive Intelligence

Driving to One Percent: Call Analysis/Answering Machine Detection

Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Driving to one percent - In this series, we view this phenomenon from a business perspective and how seemingly minor additions, deletions, or shifts can reap substantive results.
Tags : 
driving to one percent, call analysis, answering machine detection, interactive intelligence, fdcpa compliance, knowledge management, enterprise applications, business technology
    
Interactive Intelligence

TCPA Compliance: Perspectives on Current Technology Options

Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In this white paper series, on TCPA, from ARM.com, Latitude Software, and Interactive Intelligence, we asked collection industry attorneys David Kaminski and Anita Tolani to weight in on different aspects of technology for TCPA compliance.
Tags : 
tcpa compliance, telephone consumer protection act, compliance, interactive intelligence, knowledge management, enterprise applications, business technology, telecom
    
Interactive Intelligence

"Guaranteeing" Compliance: Better Hiring, Better Work Environment, Better Quality Management

Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Are your collectors FDCPA-compliant when they're on the phone with consumers? There are many options available to call centers and collection agencies. In this white paper, we get through the thoughts and opinions and various voices in the industry.
Tags : 
better hiring, better work environment, better quality management, fdcpa compliancy, better hiring, better quality management, knowledge management, enterprise applications
    
Interactive Intelligence

The Future of Compliance for the Debt Collection Industry: 10 Forecasts for 2012

Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In an effort to help receivables management companies achieve compliance with federal and state laws and regulations, Interactive Intelligence queried a group of ten ARM industry professionals about the future trajectory of compliance issues in 2012.
Tags : 
debt collection, compliance, 2012, interactive intelligence, debt collection compliance, arm, interactive intelligence, knowledge management
    
Interactive Intelligence

Sarbanes-Oxley and Its Impact on IT Outsourcing

Published By: OneNeck IT Services     Published Date: Aug 24, 2007
The nature of corporate accounting and financial controls has forever been changed by Sarbanes-Oxley legislation. This white paper discusses the ripple effect of the Act on the IT outsourcing community and the new responsibilities and ethics that rest on companies, both public and private, that entrust all or part of their IT environment to an external third party.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan
    
OneNeck IT Services

Psssst! Heres One of the Best-kept Cybersecurity Framework Secrets

Published By: OneNeck IT Services     Published Date: May 30, 2018
Use a proven framework now, protect your data and meet compliance mandates tomorrow.
Tags : 
    
OneNeck IT Services
Start   Previous    63 64 65 66 67 68 69 70 71 72 73 74 75 76 77    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.