regulatory

Results 251 - 275 of 483Sort Results By: Published Date | Title | Company Name

A New Verdict

Published By: Globality     Published Date: Apr 05, 2018
Frustration with high legal fees and demand for local regulatory knowledge may give boutique law firms an edge with larger clients.
Tags : 
globality, legal, compliance, regulations, local regulations, security management, security policies, best practices
    
Globality

Hidden Opportunities: How Healthcare Reform Impacts Marketing Efforts

Published By: Hacker Group, Inc.     Published Date: Jan 27, 2012
Health insurance marketing is highly regulated and nuanced with complexities. Success depends upon marketers' - and their agencies' - ability to exploit knowledge of the regulatory environment as well as specialized direct/digital practices. Category expertise is critical.
Tags : 
healthcare marketing, health care marketing, health insurance marketing, medicare marketing, health care marketing ideas, health care marketing plan, health insurance marketing strategies, ideas for healthcare marketing
    
Hacker Group, Inc.

Email archiving solution for SMEs

Published By: GFI Software     Published Date: Mar 21, 2011
Companies' dependency on email to do business brings with it various problems. Storage limitations, backups, problematic PST files, access to old emails and regulatory compliance or eDiscovery requests are a few issues that arise. Failure to address these effectively could have serious repercussions for the organization.
Tags : 
gfi, email archiving, backups, storage, pst files, regulatory compliance, ediscovery, exchange server
    
GFI Software

Dynamic Warehousing for Bankers Buyer's Guide

Published By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : 
ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities
    
IBM

Data warehouses: improve strategic decision making with coherent views of data

Published By: IBM     Published Date: Jun 15, 2009
The ability to make quick, well-informed decisions is critical to competitiveness and growth for most companies. Read the white paper to see how Data warehouse solutions can deliver business insight across virtually any business process or function. And also how they're particularly valuable for understanding sales, profiling customers and analyzing business costs.
Tags : 
ibm, data warehouses, warehouse, data, data solutions, sales, business costs, olap
    
IBM

Advanced Case Management in the Healthcare Industry Podcast

Published By: IBM     Published Date: Dec 07, 2010
Case Management and the Implications in the Healthcare industry.
Tags : 
ibm, enterprise content management, advanced case management, healthcare agencies, automation, customer service, regulatory compliance, content and process management
    
IBM

Secure Remote Vendor Access to the Enterprise Data Center

Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
Axeda Corporation

How Hybrid Flash Array Helps Businesses Do More With Less

Published By: NexGen     Published Date: Feb 09, 2015
Data integrity and ultra-high performance dictate the success and growth of many companies. One of these companies is BridgePay Network Solutions, a recently launched and rapidly growing financial services organization that allows merchants around the world to process millions of daily credit card transactions. Due to the nature of their business, their IT team needed to strike the perfect balance between meeting regulatory-mandated data security measures with the lowest possible levels of latency and response times. As their growth accelerated, BridgePay realized the need to immediately address infrastructure shortcomings and prepare for their future growth. Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today.
Tags : 
vmware, bridgepay, solutions, spx, hyrbrid, flash, it management
    
NexGen

PCI: How to Safeguard Your Customer's Data Against Threats

Published By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : 
pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft
    
netForensics

FISMA Best Practices: Overcoming Persistent Weaknesses Through Effective Security Compliance

Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance
    
netForensics

Email Archiving: Understanding the Reasons, Risks and Rewards

Published By: Proofpoint     Published Date: Apr 22, 2010
Regulatory compliance, legal discovery and storage management issues are driving more organizations to consider email archiving. Here's what you should know when making decisions about your organization's use of email archiving technology.
Tags : 
proofpoint, email archiving, e-discovery, compliance, storage management, electronic discovery, search and retreival, knowledge management
    
Proofpoint

HIPAA and Beyond 2012: An Update on Healthcare Security Regulations for Email

Published By: Proofpoint     Published Date: Apr 23, 2010
Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.
Tags : 
email security, intrusion detection, intrusion prevention, secure instant messaging, hipaa compliance, database security
    
Proofpoint

Gartner Magic Quadrant for Secure Email Gateways, 2011

Published By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold
    
Proofpoint

Email archiving and storage management solution for compliance, retention and electronic discovery

Published By: DocuLex     Published Date: Jan 01, 2001
Simply the most cost efficient option for securing your organizations email awaiting data discovery and fulfilling regulatory compliance.
Tags : 
storage management, compliance, retention management, electronic discovery, regulatory compliance, retention, backup and recovery, ip storage
    
DocuLex

Developing Scenario Segmentation and Anomaly Detection Models

Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS

Making Real-World Evidence Real White Paper

Published By: SAS     Published Date: Jun 27, 2019
Imagine: Your pharmaceutical or medical device has been tested in carefully designed clinical trials and shown to meet required standards of efficacy and safety. It has gained regulatory approval and has gone to market. Now you want to know, does it measure up to its promise when used in the real world? Does it materially improve patient outcomes? Does it outperform alternative therapies? Does it achieve these outcomes at an appropriate value? Do you know which patients are most likely to benefit from it? Can you prove it, with statistical rigor? As the health care system moves toward a patient-centric, value-based approach, questions such as these are getting heightened scrutiny from all angles from regula- tors, payers, providers and patients. And they should. Real-world evidence (RWE) can provide new insight into the benefits, risks and cost effectiveness of medicines and medical devices in actual use evidence that can enable life sciences companies to develop better therapies
Tags : 
    
SAS

The CISOs Guide to Measuring IT Security

Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

Reducing Local Admin Exposure Through Application Whitelisting

Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals

Published By: Lumension     Published Date: Jan 25, 2012
Read this whitepaper to learn the six steps you need to think different about endpoint security.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

IT Pros Guide to Data Protection: Top 5 tips for Securing Data in the Modern Workforce

Published By: Lumension     Published Date: Jan 25, 2012
This white paper presents five very effective ways to improve data security in a cost-effective manner.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

Virtualization Security Risks: How to Develop Your Strategic Approach Now

Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

The Busy IT Pros Guide to Vulnerability Management: Top 5 Tips for Avoiding Preventable Attacks

Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

The Busy IT Professional's Guide to Governance, Risk and Compliance (GRC): Top 5 Tips For Simpler

Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension

Sustainable Compliance: How to Align Compliance, Security and Business Goals

Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc
    
NetIQ

Beyond FTP: Securing and Managing File Transfers

Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci
    
Linoma Software
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.