regulator

Results 401 - 425 of 502Sort Results By: Published Date | Title | Company Name

5 Things to Look for in a Cloud Provider When it Comes to Security

Published By: Oracle     Published Date: Mar 04, 2014
In This Paper • Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud • Understand the business and regulatory requirements around the data to be moved to the cloud • Know your cloud provider’s security and privacy commitments, and what responsibilities you retain
Tags : 
oracle, oracle cloud services, security, cloud provider, privacy, cloud computing
    
Oracle

Strategies to Capture Greater Value from Systems Engineering

Published By: IBM     Published Date: Oct 10, 2014
This paper discusses the practices that companies should explore to move beyond traditional PLM and ALM to realize the broader capabilities of systems engineering for reducing time to market, meeting regulatory compliance mandates and improving product quality.
Tags : 
ibm, systems engineering, business agility, smart products, cut costs, agility, revolutionizing requirements, system modelling, collaborate changes, modelling changes, engineering, software development, change management, productivity
    
IBM

Overcoming the challenges of inner-city transportation

Published By: IBM     Published Date: Jan 09, 2015
This white paper describes how an enterprise asset management system can help transit organizations efficiently address the challenges of infrastructure development, inner-city congestion, carbon emissions and regulatory compliance - while supporting more riders with a shrinking budget.
Tags : 
inner-city transportation, enterprise asset management system, asset management, infrastructure delevopment, it management, knowledge management, enterprise applications, data management
    
IBM

Strategies to Capture Greater Value from Systems Engineering

Published By: IBM     Published Date: Mar 10, 2015
This paper discusses the practices that companies should explore to move beyond traditional PLM and ALM to realize the broader capabilities of systems engineering for reducing time to market, meeting regulatory compliance mandates and improving product quality.
Tags : 
ibm, systems engineering, plm, alm, product quality, networking, it management, knowledge management
    
IBM

Pharmaceutical Social Media Marketing: Risks and Regulatory Issues

Published By: Cymfony     Published Date: Sep 13, 2007
The pharmaceutical industry is very interested in using social media to promote products, services and issues important to it. However, many drug firm executives are uncertain about how to tackle the legal and regulatory issues associated with social media communications.
Tags : 
health, healthcare, pharmaceuticals, pharmaceutical, social media, fda, compliance, cymfony
    
Cymfony

How A10 Networks' Smart IDentity Management Solutions Simplify Sarbanes-Oxley Act Compliance

Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10, a10 networks, sox compliance, it management, software compliance, sarbanes oxley compliance
    
A10 Networks

Boosting Online Banking Confidence and Usage with Secure USB Authentication

Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards, smart card, smart cards, regulatory compliance, online banking, ssl, banking, database security, aladdin
    
Aladdin

On the road to smart pumping

Published By: Schneider Electric     Published Date: May 03, 2018
Growing concern for the environment is driving increased regulatory and consumer focus on energy and water efficiency – and pump manufacturers are on the front line. To succeed in this demanding new market, pump manufacturers must build smarter pumping systems. Learn how new PLC and VSD technologies are helping to support smart pumping systems.
Tags : 
pump oem, pump, vfd, vsd, plc, pumping, altivar, variable speed drive, variable frequency drive, hmi, industrial automation, drives
    
Schneider Electric

Future-proof your packaging systems

Published By: Schneider Electric     Published Date: May 03, 2018
The challenges facing industrial companies grow more daunting by the day. Globalization, energy markets that change in real time, variations in materials and prices, aging of the industrial workforce, inability to attract the next generation of Talent, and difficult regulatory pressures have all contributed to an extremely stressful industrial business environment. Fortunately, the right automation system can now offer cutting-edge packaging solutions for meeting at least three of these challenges.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation, energy, robotics
    
Schneider Electric

B2B Solutions for Pharmaceutical Collaboration

Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
This white paper shows how BroadVision technology can help pharmaceutical companies collaborate more effectively with partners to accelerate time-to-market, gain first-mover advantage and maximize ROI.
Tags : 
broadvision, pharm, pharmaceutical, pharmaceuticals, roi, return on investment, business management, compliance, regulatory compliance, time-to-market, time to market, broadvision
    
Clearvale by BroadVision

Learn More About Penetration Testing Software: Taking the Guesswork Out of Vulnerability Management

Published By: Core Security     Published Date: Aug 21, 2009
This IDC white paper examines key trends in the vulnerability management and assessment (VA&M) market and identifies the value of penetration testing as part of a comprehensive security methodology.
Tags : 
vulnerability management, security management, idc, vulnerability, vulnerability assessment, security audit, auditing, security, security infrastructure, compliance, security compliance, regulatory compliance, core security, network security, hacker detection, internet security, intrusion detection, intrusion prevention
    
Core Security

Smart SOA: Best Practices for Agile Innovation and Optimization

Published By: IBM     Published Date: Mar 28, 2008
In this era of unprecedented change, organizations need agility to adapt rapidly. Part of what separates winners from losers is the ability to respond quickly and intelligently to market opportunities, competitive threats and regulatory constraints — in short, to innovate and create value. The best companies understand how to use technology for strategic advantage to help accomplish these goals.
Tags : 
best practices, service oriented architecture
    
IBM

Enhance Network Security and Security Data Management

Published By: IBM     Published Date: Sep 18, 2008
It’s a changing climate for network security and demands for improved documentation of regulatory compliance continue to increase. The time has come for a comprehensive, cost-effective, scalable security event and log management solution. Read this white paper for more information about the IBM solution that answers this challenge.
Tags : 
ibm, ibm, mmdg, security management, security data management, data management, network security
    
IBM

Best Practices in Data Governance (Video)

Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation, enterprise applications, data management
    
IBM

The Value of Enterprise SSO to HIPAA Compliance

Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa, hipaa compliance, regulatory compliance, authentication, imprivata, network security, access control, application security
    
Imprivata

Simplifying Data Security for Regulatory Compliance

Published By: netVigilance     Published Date: Aug 21, 2009
Today's Corporate Executives are faced with an array of Data Security legislation which mandates that they be personally accountable for the protection of customer account information. Crippling penalties present a modern day 'sword of Damocles' hanging above the desks of CTOs, CIOs, CFOs and CEOs.
Tags : 
data security, data protection, privacy, compliance, hipaa, customer data, database security, regulatory compliance, net vigilance, netvigilance, best practices, business analytics, business management, corporate governance
    
netVigilance

Complying with Regulatory and Business Security Needs

Published By: PKWARE     Published Date: Aug 21, 2009
Regulatory and business requirements are driving the need for protecting information stored and transferred electronically. PKWARE provides an introduction to protecting your most valuable asset - your data.
Tags : 
regulatory compliance, compliance, information management, data security, data protection, secure content management, pki, pkware, network security, security management, business management
    
PKWARE

Making the Grade: Automating IT Compliance for FISMA

Published By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : 
compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management, vulnerability assessment, vulnerability, preventsys, software compliance
    
Preventsys

Managing Enterprise IT Security Risk: Get Ahead Of the Problem

Published By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : 
sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance, security management, preventsys, it management, governance, corporate governance, software compliance, sarbanes oxley compliance
    
Preventsys

Compliance Multi-Tasking: Today's Security Priority

Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance, california sb-1386, california state bill 1386, authentication, secure computing, securecomputing
    
Secure Computing

Achieving Configuration Compliance in a Regulatory Framework

Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing, vulnerability management
    
Secure Computing

Intelligent Defense for Enterprise Assets: The Need for Host Intrusion Prevention

Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade, firewalls, internet security, intrusion detection
    
Third Brigade

Another Year on in the ILM Journey

Published By: Quocirca     Published Date: Mar 06, 2007
Quocirca conducted two surveys separated by 12 months that looked at the data management infrastructure of UK and Irish businesses and how this was linked to their ability to respond to the whims of the regulators. In the year between the two surveys a lot had changed.
Tags : 
information management, data management, storage, compliance, regulatory compliance, knowledge management, information lifecycle, information lifecycle managment, quocirca, ireland
    
Quocirca

Automated Penetration Testing: Completing the Vulnerability Management Framework

Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega, security, network security, auditing, hacker detection, internet security, intrusion detection, intrusion prevention, security management
    
Aomega

Privacy, Compliance, and International Data Flows

Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security, regulatory compliance, net iq, netiq, it management, auditing, security management, security policies, best practices, content delivery, document management, information management, software compliance
    
NetIQ Corporation
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.