compliance

Results 126 - 150 of 1977Sort Results By: Published Date | Title | Company Name

Managing Risk for Effective Access Governance

Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa

Fortifying the Pillars of IT Governance for Microsoft SharePoint Server 2010 Deployments

Published By: AvePoint     Published Date: May 11, 2011
This document is intended to aid IT administrators and other stakeholders responsible for managing Microsoft SharePoint deployments, in planning and implementing a comprehensive, reliable and efficient governance strategy
Tags : 
governance, sharepoint, infrastructure management, compliance, document management, migration, auditing, administration
    
AvePoint

Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough

Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix

Cloud-in-a-Box: For Development and Test

Published By: Avnet     Published Date: Aug 30, 2012
Download this paper now and find out how you can deliver applications in a shorter time-frame without compromising on your testing and compliance.
Tags : 
avnet, cloud automation software, cloud testing, test management software, improving productivity, automated deployment, performance testing, business technology
    
Avnet

Fast-Track Your SAP Migration

Published By: AWS     Published Date: Aug 28, 2017
SAP workloads represent the backbone of your business, supporting critical systems and processes across organizations: inventory planning, HR, payroll, sales, and more. Learn how running SAP on AWS cuts costs, improves performance, and ensures the reliability and compliance scalable companies need.
Tags : 
    
AWS

Fast-Track Your SAP Migration

Published By: AWS     Published Date: Aug 30, 2017
SAP workloads represent the backbone of your business, supporting critical systems and processes across organizations: inventory planning, HR, payroll, sales, and more. Learn how running SAP on AWS cuts costs, improves performance, and ensures the reliability and compliance scalable companies need. Download your copy now!
Tags : 
aws, accenture, sap, payroll, efficiency
    
AWS

Compliance for Healthcare & Life Sciences Organizations with AWS

Published By: AWS     Published Date: Sep 18, 2017
This eBook will introduce you to the compliance capabilities that can be achieved by using AWS services and its featured partners in healthcare and life sciences. In this eBook, you can learn how to build cloud-based healthcare solutions for HIPAA and other frameworks, as well as how to regulate workloads on the cloud for life sciences organizations. Download this eBook to learn more and to read actual customer use cases illustrating how healthcare and life sciences organizations can leverage AWS to help them with their compliance requirements.
Tags : 
    
AWS

Build HIPAA Eligible Solutions with AWS and APN Partners

Published By: AWS     Published Date: Aug 23, 2018
AWS supports healthcare organizations with HIPAA Eligible Services and the AWS Healthcare Compliance program. AWS products and services are being used by many customers that handle electronic patient health information (PHI) to build solutions that meet HIPAA and HITRUST regulatory requirements for cloud-based workloads. In this webinar, you’ll learn how AWS HIPAA Eligible Services can help you build secure workloads to handle PHI in compliance with HIPAA and HITRUST standards. AWS Healthcare experts will be joined in this webinar by AWS Partner Network (APN) Partners ClearDATA and Cloudticity.
Tags : 
    
AWS

Security, Compliance, & the Cloud

Published By: AWS     Published Date: Aug 15, 2018
Earning and keeping your customer’s trust is one key to long-term success. In today’s digital world, your customers expect product and service innovations at an increasingly rapid pace. At the same time, customer privacy and data security are under close scrutiny. These trends help to explain why organizations are migrating to Amazon Web Services (AWS): to benefit from the agility, scalability, and security that it offers. AWS has always put cloud security first. This security-centric approach not only helps you more effectively protect your data on AWS, but can also help you meet security and compliance standards.
Tags : 
    
AWS

How Centrify Enforces Compliance and Security Best Practices on AWS with Dome9

Published By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
AWS

Prepare your Financial Services Organization for GDPR

Published By: AWS     Published Date: Oct 31, 2018
Watch this webinar to learn how a financial services organization uses a simple, comprehensive data governance solution from Dataguise to discover, protect, and monitor sensitive personal data in real time across all its Amazon Web Services (AWS) data repositories, and to prepare for GDPR compliance.
Tags : 
financial, services, organization, gdpr
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

How You Can Build Trust Between Your Security and Developer Teams

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

How You Can Build Trust Between Your Security and Developer Teams

Published By: AWS     Published Date: Jun 03, 2019
Background As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS

End-to-End Security Visibility into Your Environments with Splunk and AWS

Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS

How Ancestry Manages Risk in Their Application Environments with Qualys on AWS

Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS

Transition from Commercial Databases to AWS

Published By: AWS     Published Date: Aug 06, 2019
Old-guard database providers are expensive, proprietary, have high lock-in costs, and impose restrictive licensing terms. The challenge to date has been to achieve the same performance and availability of commercial-grade databases on open source databases such as MySQL, PostgreSQL, and MariaDB. Examine key considerations that go into any database migration decision and specific use cases—in Financial Services and Healthcare Analytics implementations—where Datavail carefully managed database migrations from traditional database providers to the cloud—and in particular Amazon Aurora. Download the eBook to learn about: Migration considerations and strategies including lift and shift, re-platforming, and re-factoring Security and compliance functionality enabled by Amazon Aurora Performance and scalability opportunities enabled by AWS
Tags : 
    
AWS

Secure Remote Vendor Access to the Enterprise Data Center

Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
Axeda Corporation

Meeting SOX, PCI, and HIPAA Compliance with Secure and Auditable Vendor Access

Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox
    
Axeda Corporation

Gamification: The Long and Short of It

Published By: Badgeville     Published Date: Feb 13, 2014
Game applications in business result in both long and short-term success. Short-term effects will occur quickly, while proper implementation and use of game psychology will enable business leaders to maintain this success in the long-term. Gain valuable insights into both long and short-term gamification success from these industry visionaries, and learn how to harness the power of games to fundamentally change the nature of work.
Tags : 
gamfiication, gamify, engagement, bunchball, gigya, big door, loyalty, productivity
    
Badgeville

Fortune 500 Security on a Budget

Published By: BAE Systems     Published Date: Dec 29, 2015
How to secure your network without busting your IT budget
Tags : 
bae systems, applied intelligence, fortune 500, business security, network security, it management, security products, security systems
    
BAE Systems

What Financial Institutions Should Look for in a Managed Security Service Provider

Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach
    
BAE Systems

The Importance of Cyber Resilience and Incident Response for Financial Institutions

Published By: BAE Systems     Published Date: Jan 06, 2016
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked.. If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
Tags : 
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack
    
BAE Systems

Financial Services: Drive Acquisition, Retention, and Innovation Using Customer Feedback

Published By: Bazaarvoice     Published Date: May 17, 2013
Learn how authentic customer feedback helps card issuers, online and retail banks, insurance companies, and credit unions drive sales, loyalty, and lifetime customer value - while remaining compliant with industry regulations.
Tags : 
customer acquisition, customer retention, customer innovation, compliance, financial service providers
    
Bazaarvoice
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.