regulator

Results 426 - 450 of 505Sort Results By: Published Date | Title | Company Name

Another Year on in the ILM Journey

Published By: Quocirca     Published Date: Mar 06, 2007
Quocirca conducted two surveys separated by 12 months that looked at the data management infrastructure of UK and Irish businesses and how this was linked to their ability to respond to the whims of the regulators. In the year between the two surveys a lot had changed.
Tags : 
information management, data management, storage, compliance, regulatory compliance, knowledge management, information lifecycle, information lifecycle managment, quocirca, ireland
    
Quocirca

Automated Penetration Testing: Completing the Vulnerability Management Framework

Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega, security, network security, auditing, hacker detection, internet security, intrusion detection, intrusion prevention, security management
    
Aomega

Privacy, Compliance, and International Data Flows

Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security, regulatory compliance, net iq, netiq, it management, auditing, security management, security policies, best practices, content delivery, document management, information management, software compliance
    
NetIQ Corporation

Monitor System Changes And User Activity

Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : 
pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring, access control, regulatory compliance, hipaa, fisma, audit, auditing, windows, hipaa compliance
    
NetIQ Corporation

Meeting Regulatory Log Requirements

Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : 
security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance, pci, pci dss, sarbox, sox, sox compliance, fisma, basel ii, reporting, analysis, analytic, netiq, net iq
    
NetIQ Corporation

Leveraging Automation to Quickly Reveal Vulnerabilities

Published By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : 
application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection, cenzic, security, auditing, authentication, encryption, firewalls, identity management, internet security, intrusion detection, intrusion prevention, policy based management, security management
    
Cenzic

Cenzic: Application Security for Financial Institutions

Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic, security, it management, firewalls, high availability, identity management, intrusion detection, intrusion prevention, policy based management, security management
    
Cenzic

Business Success Dependent on Data Protection Capabilities

Published By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : 
data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage, data replication, xiotech, data management, backup and recovery, storage management
    
Xiotech

Managing PST Files from Discovery to the Archive

Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
As the need to retain corporate data has increased to meet regulatory requirements-- and best practice may dictate email meeting certain internal policies-- the very existence of PSTs is putting email more and more "at risk. So what can you do about PSTs?
Tags : 
im and email archiving, im archive, email archive, email security, data management, enterprise email, personal email, email archiving, c2c, pst, outlook, mailbox, storage, messaging
    
C2C Systems, Inc.

Achieve and Maintain Compliance with PCI Data Security Standard - Part 1

Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance
    
Ecora Software

Configuration Management and Documentation to Meet Federal IT Compliance Mandates

Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance, compliant, regulatory compliance, audit, auditing, cmdb, gisra, ecora
    
Ecora Software

Practical Guide to Sarbanes-Oxley Compliance

Published By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management, finance, financial records, audit, auditing, regulatory compliance, ecora, business continuity, disaster recovery
    
Ecora Software

Sustaining Sarbanes-Oxley IT Internal Controls

Published By: Ecora Software     Published Date: Aug 15, 2007
Our guide shows you how automation can create a sustainable control and reporting system – a must-have with mandated quarterly and annual assessments. If you've already prepared for, and experienced, your first Sarbanes-Oxley audit, you'll want to read this guide on sustainability.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management, finance, financial records, audit, auditing, regulatory compliance, ecora, database security, sarbanes oxley compliance
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 4

Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, vulnerability management
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 3

Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, vulnerability management
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 2

Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance, vulnerability management
    
Ecora Software

Top 10 Keys to Gaining Enterprise Configuration Visibility

Published By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : 
configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil, change management, ecora, enterprise applications, it spending
    
Ecora Software

How to Leverage Quality Management for Regulatory Compliance

Published By: Interactive Intelligence     Published Date: Feb 26, 2013
In today's regulations and risk management, business has become increasingly complex, and penalties are growing. Managing risk must therefore include monitoring the actions of your entire organization and more. Read on to learn more about compliance.
Tags : 
quality management, regulatory compliance, risk management, complex risk, monitoring actions, data management, business technology
    
Interactive Intelligence

California Credit Union Achieves Regulatory Compliance with Neoscale

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.

NeoScale Helps Major Bank Meet Government Regulatory Requirements

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.

Secure Your IT Systems by Auditing Configuration Changes

Published By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : 
netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing, systems monitoring, software development, it management
    
Netwrix

Rogue IT: Compliance of IT in the Capital Markets

Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure, best practices, regulatory compliance, cmdb, tideway, tideway systems, it management
    
Tideway Systems

Secure Network Access for Contractors, Business Partners and Guests

Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication, local area networking
    
Identity Engines

Managing Metadata for Life Science Enterprises

Published By: SchemaLogic     Published Date: Jun 11, 2008
In the Life Sciences industry, information is the source of innovation. Vast varieties of content and information sources feed the development pipeline. The ability to create, share, navigate, find and protect essential information is critical to research and development groups, clinicians, regulatory agencies, marketing teams, and those who benefit the most - customers.
Tags : 
pharm, pharmaceutical, pharmaceuticals, medicine, life science, chemistry, chemical, biological, metadata, mdm, metadata management, schemalogic, data management, data integration, data protection
    
SchemaLogic

Case Story: Growth, Regulatory/Customer Demands Drive A&D Optics Company to IFS Applications

Published By: IFS     Published Date: Dec 27, 2012
Steady business growth and the demanding nature of the defense industry led exotic electro-optics, Inc. (eeo) to implement IFS Applications.
Tags : 
erp, enterprise resource planning, enterprise, integration, process management, project management, application performance management, best practices, enterprise software
    
IFS
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.