regulator

Results 301 - 325 of 517Sort Results By: Published Date | Title | Company Name

LogRhythm for PCI-DSS Compliance

Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology
    
LogRhythm

LogRhythm for Sarbanes Oxley (SOX)

Published By: LogRhythm     Published Date: Sep 26, 2008
Do you need to simplify your financial reporting process to ensure that you are meeting the Sarbanes Oxley requirements? Read this whitepaper to learn more…
Tags : 
sox, sarbanes oxley, sox compliance, sarbanes oxley compliance, compliance, comply, information technology, security
    
LogRhythm

LogRhythm Positioned as a Leader in Magic Quadrant for Security Information and Event Management

Published By: LogRhythm     Published Date: Jan 24, 2013
Gartner's 2012 SIEM Magic Quadrant report that positions LogRhythm as a leader against other technologies designed to collect, store, analyze and report on log data for regulatory compliance and forensics.
Tags : 
logrhythm, magic quadrant, security information, event management, gartner, security, it management, data management
    
LogRhythm

Lowering the Cost of Healthcare from the Inside Out

Published By: IBM     Published Date: Apr 18, 2012
Join this webcast to learn how HealthCare specific Asset and Service Management functionality can improve uptime to support patient care and optimize procedure scheduling, control costs for procurement, maintenance, labor and materials, extend asset longevity, and Support regulatory compliance activities.
Tags : 
healthcare, cost, ibm, asset management, service management, technology
    
IBM

Lumension Patch Management: Picking the Low-Hanging Fruit

Published By: Lumension     Published Date: Jan 11, 2012
Find out why fixing 3rd-party app vulnerabilities is at the core of IT security-and how to make sure patch management is optimizing your security.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

Magic Quadrant for User Administration/Provisioning

Published By: NetIQ     Published Date: Nov 05, 2012
User administration solutions manage identities and their attributes across systems, applications and resources. Buyers seek to demonstrate regulatory compliance while reducing project deployment times and costs.
Tags : 
iam, identity and access management, iam initiatives, security compliance, security, business technology, research
    
NetIQ

Making Progress In Risk Management

Published By: IBM     Published Date: Jun 25, 2013
The global credit crunch that began in 2007 threw the financial industry into turmoil and highlighted the need for financial firms to improve their risk management practices. Today, the credit crisis is far from over. Markets remain volatile, and financial firms face waves of regulatory requirements intended to safeguard the solvency of individual firms and the stability of economies worldwide. These reforms will dramatically affect firms — burdening the profitability and growth of some, and the very survival of others.
Tags : 
risk management, financial industry, profitability, smarter risk management practices, database development, project management, desktop management
    
IBM

Making Real-World Evidence Real White Paper

Published By: SAS     Published Date: Jun 27, 2019
Imagine: Your pharmaceutical or medical device has been tested in carefully designed clinical trials and shown to meet required standards of efficacy and safety. It has gained regulatory approval and has gone to market. Now you want to know, does it measure up to its promise when used in the real world? Does it materially improve patient outcomes? Does it outperform alternative therapies? Does it achieve these outcomes at an appropriate value? Do you know which patients are most likely to benefit from it? Can you prove it, with statistical rigor? As the health care system moves toward a patient-centric, value-based approach, questions such as these are getting heightened scrutiny from all angles – from regula- tors, payers, providers and patients. And they should. Real-world evidence (RWE) can provide new insight into the benefits, risks and cost effectiveness of medicines and medical devices in actual use – evidence that can enable life sciences companies to develop better therapies
Tags : 
    
SAS

Making SOP Training More Effective

Published By: UL EduNeering     Published Date: Jul 05, 2012
SOPs are critical to efficient manufacturing operations, quality control, and regulatory compliance. This paper reviews best practices for the Life Science industry for training on SOPs, and how learning management technology has the potential to improve learner retention through automated assessments.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
    
UL EduNeering

Making the Case for a Cloud Access Security Broker (CASB)

Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Leveraging cloud technology enables your enterprise to be more agile and competitive while significantly reducing costs. However, there are risks associated with these benefits. Getting new capabilities quickly is worth far less if it means exposing vulnerabilities that result in regulatory compliance violations and fees, loss of intellectual property (IP), loss of customer data, or damage to your reputation, brand, and future business.
Tags : 
    
Oracle Security Solutions

Making the Grade: Automating IT Compliance for FISMA

Published By: Preventsys     Published Date: Aug 21, 2009
Increased assessment, reporting and compliance requirements are going to be difficult to manage from year to year, and organizations without the right strategy, will face a significant increase in costs to audit and report on compliance annually.
Tags : 
compliance, regulatory compliance, fisma, security management, audit, auditing, security audit, vulnerability management
    
Preventsys

Malicious Cryptominers are Eying Your Resources

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA

Managing Enterprise IT Security Risk: Get Ahead Of the Problem

Published By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : 
sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance
    
Preventsys

Managing Metadata for Life Science Enterprises

Published By: SchemaLogic     Published Date: Jun 11, 2008
In the Life Sciences industry, information is the source of innovation. Vast varieties of content and information sources feed the development pipeline. The ability to create, share, navigate, find and protect essential information is critical to research and development groups, clinicians, regulatory agencies, marketing teams, and those who benefit the most - customers.
Tags : 
pharm, pharmaceutical, pharmaceuticals, medicine, life science, chemistry, chemical, biological
    
SchemaLogic

Managing PST Files from Discovery to the Archive

Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
As the need to retain corporate data has increased to meet regulatory requirements-- and best practice may dictate email meeting certain internal policies-- the very existence of PSTs is putting email more and more "at risk. So what can you do about PSTs?
Tags : 
im and email archiving, im archive, email archive, email security, data management, enterprise email, personal email, email archiving
    
C2C Systems, Inc.

Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

Published By: IBM     Published Date: Jun 22, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : 
ibm, compliance requirements, quality management tools, quality management, best practices, software development, it management, knowledge management
    
IBM

Managing your data successfully is key to unlocking the value of open economies

Published By: INT_AstuteIT_ABM_DoubleTouch_BENELUX     Published Date: Feb 23, 2018
Digital technologies and increasing customer engagement point traditional financial institutions towards a wonderful new world of an enhanced customer experience. Herded by a wave of regulatory ‘enablers’ - through the yin-yang regulations in the form of the GDPR and PSD2 - the industry landscape is ripe for transformation for those willing and able to embrace this new world: connected customer ecosystems beyond their own institutional walls. In doing this, this creates more comprehensive customer journeys - and ultimately, better quality customer experiences.
Tags : 
    
INT_AstuteIT_ABM_DoubleTouch_BENELUX

Medication Adherence & Smart Devices for Clinical Trials by Ypsomed, Philips, & AWS

Published By: AWS     Published Date: Jul 16, 2019
Ypsomed is a leader in the development and manufacturing of injection and infusion systems. The company is keenly aware of the multi-billion dollar problem of poor medication adherence and the need to measure medicine intake and ensure doses are taken at the correct time. Ypsomed sought to create a digital solution for medication adherence monitoring and smart device management for contract research organizations’ (CROs) use in clinical trials, including self-injection systems for trial participants to administer medications at home. Yet the company faced serious demands for remote device management, global scale, and privacy and security regulations such as HIPAA and GDPR. To solve these challenges, Ypsomed adopted Philips’ HealthSuite digital platform (HSDP), a cloud platform built on Amazon Web Services (AWS). HSDP allows Ypsomed to connect devices to the cloud and remotely manage them; store data; and manage and scale services globally within healthcare regulatory, privacy, and s
Tags : 
    
AWS

Meeting Regulatory Log Requirements

Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : 
security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance
    
NetIQ Corporation

Middle market leaders weigh in on corporate tax reform, regulatory changes and more in our report.

Published By: KeyBank Commercial Banking     Published Date: Nov 08, 2017
See what’s on the minds of middle market leaders by reading our latest quarterly report now.
Tags : 
middle market, us economy, economic outlook, business acquisitions, business expansion, treasury regulations, corporate tax reform
    
KeyBank Commercial Banking

Midmarket ERP Solutions Comparison Guide

Published By: Tippit ERP     Published Date: May 18, 2009
Download this side-by-side comparison guide that breaks down the industry's top 11 ERP players (including Epicor, Infor, Microsoft, and NetSuite) so you can quickly and easily compare the features and costs of each. Learn more today!
Tags : 
erp, midmarket, inside erp, epicor, infor, microsoft, netsuite, lawson
    
Tippit ERP

Mimecast Eases Notifiable Data Breaches (NDB) Compliance for Email

Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast

Mimosa NearPoint for Microsoft Exchange Server

Published By: Mimosa Systems     Published Date: Jan 14, 2009
Email archiving is emerging as a critical new IT application for managing email. For legal discovery, storage management, and regulatory compliance, email archiving provides important benefits that cannot be achieved with native email applications. The purpose of this “Email Archiving 101” paper is to provide a basic introduction to email archiving and explain how it benefits management of the email application server. The leading enterprise email application is Microsoft® Exchange Server, and this paper is geared toward this application; however, the principles discussed apply to all messaging applications.
Tags : 
mimosa systems, email archiving, mimosa nearpoint, microsoft exchange server, email applications, enterprise email application, it management, enterprise applications
    
Mimosa Systems

Miners in the Shadows: Extracting Treasure with Stolen Resources

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA

Minimizing the Burden of PCI Compliance: A New Approach to Credit Card Encryption

Published By: Paymetric     Published Date: Dec 13, 2007
This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.
Tags : 
erp, pci, pci compliance, erp, pci, ompliance, sap, sap
    
Paymetric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.