enforcement

Results 51 - 75 of 84Sort Results By: Published Date | Title | Company Name

Meeting the IT Challenges of Body Camera Technology Adoption

Published By: Lenovo and Intel     Published Date: Jan 19, 2017
It’s no secret that video is the new paradigm in law enforcement; but, with video comes the need to log, manage, store, and secure thousands of hours of content—and that makes huge demands on your data center infrastructure. In this white paper, we detail infrastructure challenges faced by state and local agencies and how they are overcoming them with powerful infrastructure solutions. Download the white paper and read more.
Tags : 
    
Lenovo and Intel

NetApp Helps Greater Manchester Police Bring Law and Order to Storage

Published By: NetApp     Published Date: Feb 22, 2010
Meeting growing storage needs and improving data resilience, without adding complexity to the IT environment.
Tags : 
netapp, law enforcement, storage, data resilience, business continuity, application performance, data management, storage management
    
NetApp

Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
Trend Micro, Inc.

Next generation law enforcement demands next generation cloud storage

Published By: Wasabi     Published Date: Nov 13, 2018
As cams and digital video become more critical to law enforcement, their success will be in large part dependent on the ability to efficiently store and access that data. In this case study we look at Novus Insight, a leading integrator of managed video storage for law enforcement agencies, and their decision to use Wasabi Hot Cloud Storage. Novus is tasked with helping law enforcement manage the massive volumes of digital video evidence that body and dash cams are creating. Not a simple proposition for these budget and resource constrained public agencies. After surveying the available options Novus found going with Wasabi an easy choice. Wasabi’s revolutionary storage technology allows for an unprecedented combination of speed, affordability and security. It not only brings Novus the instantly scalable cloud solution they need, it dramatically improves performance and economics at the same time. To learn more about how Novus and Wasabi are helping enable better policing through bette
Tags : 
    
Wasabi

NGFW Requirements for SMBs and Distributed Enterprises

Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco

Operating Rules Quick Start Guide

Published By: RelayHealth     Published Date: Mar 29, 2013
Operating Rules Countdown: Enforcement Action Began April 1 - The Centers for Medicare and Medicaid Services (CMS) announced in January that enforcement action for Phase I and II Operating Rules was delayed until March 31, 2013. This phase of Operating Rules is related to enhanced delivery and content of eligibility and claim status responses.
Tags : 
operating, medicare, services, rules, eligibility, claim
    
RelayHealth

Practical Steps to Help Ensure Proper Form I-9 Compliance

Published By: HireRight     Published Date: Jul 31, 2013
As state E-Verify legislation becomes more ubiquitous, coupled with federal legislation and increasingly stringent enforcement policies, it has never been more important for all organizations, regardless of size or industry.
Tags : 
hireright, i-9 compliance, ice fines, e-verify legislation, human resources
    
HireRight

Prevent Costly Outages Due to Expired Digital Certificates

Published By: Venafi     Published Date: Mar 26, 2015
We rely on cryptographic keys and digital certificates for encryption and authentication. But certificates can, and do, expire, creating costly outages. Organizations need visibility, continuous surveillance, policy enforcement, and automation to eliminate outages caused by expired certificates and secure their keys and certificates.
Tags : 
outages, digital certificates, encryption, authentication, surveillance, automation
    
Venafi

Public Safety, Justice, and IoE WP and Infographic

Published By: Cisco     Published Date: Sep 15, 2015
This paper examines how the increasingly ubiquitous connectedness of our IoE world can help provide public safety and justice agencies with new opportunities to meet and overcome the challenges they face. It specifically examines this topic through applications in law enforcement, emergency response, corrections, courts, and national security, and shows how IoE can help transform agencies to better protect citizens and make communities safer. Finally, this paper will provide recommendations on strategy implementation to enable agencies to take the next steps.
Tags : 
public safety, iot, law enforcement, emergency response, strategy, convergence, application integration
    
Cisco

Ransomware Defense for Dummies

Published By: Cisco EMEA     Published Date: Nov 13, 2017
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the internet. As a global market leader in our industry, we help our customers connect, digitize, and thrive. Together, we change the way the world works, lives, plays and learns.
Tags : 
ransomware, threat landscape, operations, risks, enforcement, defend, firewalls, network
    
Cisco EMEA

Reducing the Burden of Administration for Email Content Control, Compliance & Policy Enforcement

Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance
    
Nemx Software Corporation

Secure Enterprise Mobility to Prevent Data Loss and Unauthorized Access

Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi

Securing the Network from Spam, Malware & Other Threats

Published By: Clearswift     Published Date: Jun 09, 2008
This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.
Tags : 
clearswift, network security, internet security, web security, anti spam
    
Clearswift

Securite Totale Des Donnees ou baies tout Flash

Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 n’a pas été une année facile pour les DSI / RSSI et 2018 ne semble pas montrer des signes d’embellie. Etant donné le grand nombre de compromissions de données aux conséquences dramatiques (Equifax, Uber, Yahoo pour ne citer que quelques exemples) et compte tenu du renforcement des obligations réglementaires dans le monde, les DSI / RSSI sont contraints de devoir revoir leur approche de la sécurité des données.
Tags : 
    
Infinidat EMEA

Security and HIPAA Compliance: Meeting the Challenge of Securing Protected Health Information

Published By: NetIQ     Published Date: Dec 23, 2010
The paper also provides an overview of the HITECH Act, which addresses the privacy and security concerns associated with the electronic transmission of health information, in part, through several provisions that strengthen the civil and criminal enforcement of the HIPAA rules.
Tags : 
netiq, security, hipaa compliance, protected data, compliance, internet security, data protection
    
NetIQ

Security Evolved: Why It's Time To Bring Together Identity, Access and Real-Time Threat Prevention

Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt

Security-as-a-Service: Threat Mitigation from the Cloud

Published By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : 
mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
Mimecast

Sharing Intelligence and Distributing Enforcement Everywhere

Published By: OpenDNS     Published Date: Mar 31, 2015
"Security solutions are getting more sophisticated, but so are the advanced threats that you are up against. While businesses have the power to gather more intelligence from more sources, it can be difficult to share that intelligence and apply enforcement on any device, anywhere, anytime."
Tags : 
    
OpenDNS

SSL VPN Checklist

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail

Strategies to Defend the Digital Healthcare Enterprise Against Patient Data Breaches 

Published By: Thales     Published Date: Jul 13, 2017
Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.
Tags : 
thales, data protection, health records, data security, hippa, hacker detection, intrusion prevention, best practices
    
Thales

Strong Customer Authentication Explained

Published By: Stripe     Published Date: Jun 11, 2019
On 14 September 2019, new requirements for authenticating online payments called Strong Customer Authentication (SCA) will be introduced in Europe as part of the second Payment Services Directive (PSD2). The changes introduced by this new regulation are set to deeply affect internet commerce in Europe. Impacted businesses that don’t prepare for these new requirements could see their conversion rates significantly drop after the enforcement of SCA. This guide takes a closer look at these new requirements and the kinds of payments they will impact, including ways to use exemptions for low-risk transactions to offer a frictionless checkout experience. Download the guide to learn more.
Tags : 
sca, online economy, online payment
    
Stripe

Summer 2018 State of the Internet / Security: Web Attacks Report

Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies

TechTarget: 3 Major Challenges to Securing Your Network

Published By: Juniper Networks     Published Date: Feb 01, 2016
This new report from TechTarget identifies three specific challenges to overcome: Deploying an integrated suite of security services Closing the gap between intelligence and enforcement Centralizing visibility and management
Tags : 
    
Juniper Networks

The Connected Public Safety Agency

Published By: Cisco     Published Date: Sep 15, 2015
To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times. Cisco and our partners can help agencies obtain secure networks.
Tags : 
public safety, iot, law enforcement, emergency response, strategy, convergence, cloud computing
    
Cisco

The Future of U.K. Enforcement of Financial Crimes: Four Clues for 2015

Published By: NAVEX Global     Published Date: Nov 10, 2014
In this whitepaper, Andrew Foose, vice president of NAVEX Global’s Advisory Services Team, analysed recent legal developments in the U.K. and uncovered four valuable clues on how enforcement of financial crimes may play out in 2015
Tags : 
financial crimes in the uk, enforcement of financial crimes, navex, financial management, employee training software
    
NAVEX Global
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.