compliance

Results 1951 - 1975 of 2045Sort Results By: Published Date | Title | Company Name

Vulnerability Management 101: What’s a Risk and How Can I Mitigate as Many as Possible?

Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
    
Perimeter

Vulnerability Management for Dummies

Published By: Qualys     Published Date: Jan 11, 2017
Businesses use the Internet as a vital global resource for huge benefits in linking workers, suppliers and customers. However, connecting with the global Internet exposes your company network to many threats.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys

WagerWorks Takes Fraudsters Out of the Game using iovation Device Reputation

Published By: Iovation     Published Date: Oct 21, 2009
With device reputation, WagerWorks gained valuable insight into the account activity on its sites, and as a result achieved greater control over fraud and abuse. By easily identifying account-device relationships and providing data for in-depth forensic analysis, iovation ReputationManager proved to be the most important addition to the company's overall fraud prevention process
Tags : 
wagerworks, iovation, fraud prevention, security, identity management, compliance, online gaming abuse, security management
    
Iovation

Wall-Mount Rack Solutions for PCI Compliance

Published By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
    
Tripp Lite

Watch how you can easily run a comprehensive assessment of the risk to your most sensitive data.

Published By: McAfee     Published Date: Mar 11, 2013
McAfee Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee

Webinar: E-Invoicing in Latin America: Ensuring Compliance and Alignment with Corporate Strategies

Published By: OpenText GXS     Published Date: Apr 22, 2014
Join Christiaan van der Valk , CEO of Trustweaver, in this webinar, for an in-depth review of the current global Latin America e-invoicing landscape to ready you with an accurate starting point for your strategic e-invoicing planning.
Tags : 
gxs, opentext, electronic invoicing, trustweaver, latin america, strategic invoicing, corporate strategies, compliance
    
OpenText GXS

Webinar: From SIEM to Security Analytics: The Path Forward

Published By: RSA Security     Published Date: Jan 07, 2014
Watch this on-demand webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis. Understand why organizations are moving to a true big data security platform where compliance is a byproduct of security, not the other way around.
Tags : 
security analytics, siem, advanced threats, best practices, security visibility, log collection, security
    
RSA Security

Webinar: Sanctions compliance after Brexit be prepared

Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: Details of current sanctions policy and post-Brexit implications How financial and economic sanctions impact the private sector How manage compliance better by using sanctions technology.
Tags : 
    
KPMG

Website Security for Dummies

Published By: Symantec     Published Date: Nov 30, 2015
Website security is important for every business that has an online presence, but different companies have different needs and compliance requirements.
Tags : 
    
Symantec

Welding Different Companies into a Business Powerhouse

Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality, enterprise applications, customer relationship management
    
Microsoft Dynamics

Wellness Programs Under the ACA: The Legal Environment

Published By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : 
employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program
    
The Vitality Group

What Do You Mean TLS 1.3 Might Degrade My Security?

Published By: Gigamon     Published Date: Mar 26, 2019
Read What Do You Mean TLS 1.3 Might Degrade My Security? to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. Well show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon

What Do You Mean TLS 1.3 Might Degrade My Security?

Published By: Gigamon     Published Date: Jun 10, 2019
Read What Do You Mean TLS 1.3 Might Degrade My Security? to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. Well show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon

What Do You Mean TLS 1.3 Might Degrade My Security?

Published By: Gigamon     Published Date: Feb 20, 2019
Read What Do You Mean TLS 1.3 Might Degrade My Security? to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. Well show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon

What does the GDPR mean to you?

Published By: CA Technologies     Published Date: Sep 13, 2017
"There's new legislation in place, that's expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across testing and development environments. It's the General Data Protection Regulation (GDPR). Are you ready for it? In this session, well demonstrate how CA Test Data Manager helps to both mask your production data and to generate synthetic test data; a powerful combination to help you meet compliance needs and deliver quality applications. There will be a short section on the future of the tester self-service model that will enable testers to efficiently get access to the right test data."
Tags : 
    
CA Technologies

What Executives Need to Know About Security Testing Tools and Open Source

Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software

What GDPR Means for your Security Strategy Understanding the implications for your organisation

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

What makes the cloud secure?

Published By: Amazon Web Services     Published Date: Nov 28, 2017
So youre thinking about moving to the cloud. Which means youve got some new (and some old) security issues to think about. Where do you start? What should you look for when youre planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, weve worked with millions of cloud users in 190 countries, from all kinds of industries large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but weve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services

What Security Professionals Need to Know About Open Source Vulnerabilities

Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software

What to Look for in Cloud-Based Email

Published By: SilverSky     Published Date: Mar 20, 2013
In this whitepaper, we highlight the important issues surrounding cloud email, such as cost, security, monitoring, uptime, and compliance.
Tags : 
email, cloud, uptime, compliance, data protection, security, email security, business continuity
    
SilverSky

What's Compliance Costing You?

Published By: Mimecast     Published Date: Jul 15, 2019
Why Financial Services Organizations Need Modern Supervision
Tags : 
    
Mimecast

WhatsApp from a compliance headache to an enterprise productivity tool

Published By: Nativeflow     Published Date: Feb 25, 2014
Are your employees using WhatsApp? Is mobile messaging taking over an ever-growing portion of your enterprise communications? Is your enterprise running into compliance considerations around messaging? Learn about approaches to addressing these challenges so that your employees can communicate on the go and your enterprise data will be protected.
Tags : 
whatsapp, enterprise communication, employees, enterprise data protection, enterprise data, mobile protection, mobile messaging, application integration
    
Nativeflow

Whats the best way to eliminate cybersecurity and compliance risks?

Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies

Whats the best way to eliminate cybersecurity and compliance risks?

Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies

When the Going Gets Tough, Good Institutions Get Even Tougher on Ensuring Reg

Published By: Tripwire     Published Date: Jun 30, 2009
Learn the 5 core competencies of compliance and how to institute an automated compliance solution.
Tags : 
tripwire, banking, confidence, institution, regulatory, compliance, automated, solution
    
Tripwire
Start   Previous    68 69 70 71 72 73 74 75 76 77 78 79 80 81 82    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.