compliance

Results 1801 - 1825 of 2022Sort Results By: Published Date | Title | Company Name

Email Archival: For Compliance, Discovery & Storage

Published By: Computhink     Published Date: Jan 31, 2008
Lisa Morgan, Director Channel Programs, and Vince Smolek, Technical Services Manager at Computhink discuss the benefits of ViewWise, an email archive service.
Tags : 
email archiving, email archive, archive, archiving, storage, computhink, video, compliance
    
Computhink

Rogue IT: Compliance of IT in the Capital Markets

Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure
    
Tideway Systems

TeraCloud Storage Analytics: The Power of Knowledge

Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san
    
TeraCloud

5 Reasons to Manage with Controls

Published By: Intellitactics     Published Date: Feb 28, 2008
Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.
Tags : 
siem, intellitactics, compliance, security management, risk management
    
Intellitactics

How to Learn to Love a Security Audit

Published By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : 
compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis
    
Intellitactics

Professional Services: Security Compliance & International Communication

Published By: Easynet     Published Date: Mar 26, 2008
Professional services firms need network services that can connect international operations reliably, flexibly, cost-effectively and securely. This Executive Brief highlights the major business and technology trends taking place in the professional services sector in Western Europe, focusing on the increasing internationalization of the industry and the advantages of adopting innovative ICT solutions.
Tags : 
compliance, security, vpn, professional services, communication, managed networks, easynet, network management
    
Easynet

PCI Compliance: The New Reality for European Retail Companies

Published By: Easynet     Published Date: Mar 26, 2008
Compliance with the payment card industry (PCI) data security standard is now a reality for every retailer: compliance should be high on every retailer's list of priorities for enterprise security. With this reality comes the need for retailers to fully understand their PCI compliance status through a thorough gap analysis and associated risk assessment.
Tags : 
compliance, vpn, retail, managed networks, easynet, network management, pci compliance
    
Easynet

Using Compliance Initiatives For A Competitive Advantage

Published By: IQS     Published Date: Jun 23, 2008
Compliance initiatives typically have been viewed as overhead projects. In this white paper, learn how you can turn your compliance initiatives into a competitive advantage.
Tags : 
plm, compliance, manufacturing, quality control, quality assurance, iqs
    
IQS

A Perspective On Standards: A Tool For Global Competitive Survival In A Complex Regulatory World

Published By: Rockwell Automation     Published Date: Jun 23, 2008
In today's global markets, companies are required to navigate a plethora of standards and regulatory requirements, making global business complex. Rockwell Automation's perspective is that the harmonization of standards and regulatory requirements is the best approach to facilitate global market access, competition and growth.
Tags : 
erp, automation, manufacturing, rockwell, rockwell automation, compliance
    
Rockwell Automation

Entrepreneurs & Managed IT: Putting Big Company Strategies to Work for Small & Mid-Sized Businesses

Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services
    
Managed Systems, Inc.

Why Software License Management is So Difficult - And How to Simplify It

Published By: CA ITAM     Published Date: Sep 09, 2008
Learn more on how improving the efficiency of software inventory and license management processes can provide you with a host of benefits, including improved IT governance through stronger software compliance standards and processes, automated correlation of relevant software products within an organization’s infrastructure to their respective licenses, and reduced costs in the areas of license procurement, use rights and software purchases.
Tags : 
    
CA ITAM

The Method Behind PCI's Madness

Published By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection
    
LaGarde

Why You Need a Better Way to Manage Email Attachments

Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
    
YouSendIt

LogRhythm Compliance Support for FISMA

Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis
    
LogRhythm

LogRhythm for Gramm-Leach-Bliley Act (GLBA)

Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security
    
LogRhythm

LogRhythm for Health Insurance Portability and Accountability Act (HIPAA)

Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology
    
LogRhythm

LogRhythm for PCI-DSS Compliance

Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology
    
LogRhythm

LogRhythm for Sarbanes Oxley (SOX)

Published By: LogRhythm     Published Date: Sep 26, 2008
Do you need to simplify your financial reporting process to ensure that you are meeting the Sarbanes Oxley requirements? Read this whitepaper to learn more…
Tags : 
sox, sarbanes oxley, sox compliance, sarbanes oxley compliance, compliance, comply, information technology, security
    
LogRhythm

NERC CIP Compliance

Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm

UK - Government Connect Secure Extranet (GCSx)

Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology
    
LogRhythm

Using Likewise to Comply with the PCI Data Security Standard

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Published By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : 
likewise, risk, compliance, sox, security
    
Likewise Software

Deliver Mobile Apps: A Lifecycle Approach

Published By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : 
mobile apps, lifecycle approach, mobility services, bring-your-own-device, software, mobile computing, mobile data systems, smart phones
    
HP - Enterprise

Exalogic Security

Published By: Oracle Corp.     Published Date: Sep 05, 2012
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract.
Tags : 
oracle, exalogic, security, infrastructure, storage, compliance, business technology
    
Oracle Corp.

More than a Financial Requirement

Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : 
aprimo, marketing process, financial control, digital asset management, data management, knowledge management, marketing automation, system management software
    
Aprimo, Inc.
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.