Skip to main content
 

it compliance

Results 1376 - 1400 of 1499Sort Results By: Published Date | Title | Company Name
Published By: NetWrix Corporation     Published Date: Oct 19, 2010
Don Jones on secrets to implementing lightweight Active Directory change auditing that works
Tags : 
don jones, netwrix, active directory auditing, active directory change, compliance, it management, change auditing, change management
    
NetWrix Corporation
Published By: GSS Infotech     Published Date: Nov 11, 2010
The purpose of this paper is to provide a clear understanding of HIPAA and ICD migration, analyze the benefits beyond ICD remediation by providing regulation insights, and discuss the impact of the new regulations on systems,
Tags : 
healthcare, healthcare regulation, icd 10, icd challenges, icd transition, hipaa, hipaa 5010 migration, e-learning tool, testing services, icd 10 testing, icd codes, icd coding guidelines, icd classification, icd training, icd certification, icd 10 implementation, icd 9-10, hipaa certification, hipaa training, hipaa compliance
    
GSS Infotech
Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
Find out why fixing 3rd-party app vulnerabilities is at the core of IT security-and how to make sure patch management is optimizing your security.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: NetIQ     Published Date: Jan 12, 2011
This white paper discusses the growing demand for IT security auditing and why current approaches-manual procedures, scripts, and network vulnerability scanners- fail.
Tags : 
netiq, automating it security, audit, compliance, data protection, network vulnerability, secure configuration manager tool, automation
    
NetIQ
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper discusses the value of achieving security process maturity, which requires an evolutionary shift-from simply reacting to security threats to creating mature, automated security processes.
Tags : 
netiq, automation, security processes, threats, configuration assessment, roi, compliance, automated process
    
NetIQ
Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition
    
NetIQ
Published By: Osterman Research, Inc.     Published Date: Dec 28, 2010
Best practices focused on email, social media and archiving
Tags : 
email, messaging, best, practices, social, media, twitter, facebook, smartphones, compliance
    
Osterman Research, Inc.
Published By: CheckPoint HR     Published Date: Nov 09, 2012
HR-related costs continue to climb. Everywhere, organizations are looking for ways to minimize the impact of double-digit premium increases and more effectively deal with the heightened complexity of HR compliance and administration.
Tags : 
human resources, checkpoint, expenses, hr expenses, organizations, spend optimization, hr compliance
    
CheckPoint HR
Published By: TextGuard Mobile     Published Date: Mar 10, 2011
The Growing Challenges of Compliance in a Mobile World White Paper by Osterman Research
Tags : 
mobile message archiving, monitoring, compliance, sms, text messages, bbm, instant messages, archiving
    
TextGuard Mobile
Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy, it risk, policy editor, saas
    
Qualys
Published By: Berkshire Associates     Published Date: May 09, 2011
Berkshire's white paper examines the different compliance needs in the Manufacturing, Healthcare, and Finance Industries
Tags : 
affirmative action, manufacturing, finance, health care, compliance, human resources, ofccp
    
Berkshire Associates
Published By: Liaison Technologies     Published Date: Jun 03, 2011
This paper explores the use of tokenization as a best practice in improving the security of credit card transactions, while at the same time minimizing the headaches and angst associated with PCI DSS compliance.
Tags : 
liaison, nubridges, gary palgon, dss audit scope, cardholder data, pci dss compliance, tokenization, tokens, taas, direct marketer, cissp, credit card transactions
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management
    
Liaison Technologies
Published By: The Logic Group     Published Date: Jun 07, 2011
If you are a business that accepts credit or debit card payments then achieving PCI DSS compliance is an industry requirement. But how can you make it work for your business & prevent it becoming an exercise in box ticking?
Tags : 
pci dss, compliance, credit card data, debit card data, customer data, retail, payments
    
The Logic Group
Published By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneur's will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance, compliance
    
TriNet
Published By: Dell Storage     Published Date: Mar 06, 2012
By enabling organizations to centralize desktop deployment, a VDI can help simplify admin and reduce costs while enhancing security and regulatory compliance and increasing IT flexibility and business agility. Don't wait - find out more now.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi
    
Dell Storage
Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: Success Factors     Published Date: Feb 06, 2014
Organizations in regulated industries struggle with adopting SaaS-based learning solutions because of specific documentation, record-keeping, and IT requirements that must be followed, and the need to comply with a range of Good Practice (GxP) requirements. With a cloud solution that supports GxP requirements, companies in regulated industries can address compliance challenges and deliver a validated environment with a cloud-based LMS.
Tags : 
good practice, gxp, learning management system, lms, cloud-based lms, saas-based learning solutions, human resources, e-learning, employee onboarding
    
Success Factors
Published By: Skillsoft     Published Date: Jun 25, 2015
Workforce Management (WFM) systems have clearly evolved from the strictly transactional platforms used to deploy workers, track their time and attendance, manage their costs, pay them, administer benefits and provide compliance support. However, WFM systems are actually vital for driving overall business performance … not just for achieving excellence in HR, payroll and benefits administration, time and attendance management Read this white paper to learn how to realize the full value of workforce management systems.
Tags : 
workforce management system, wfm, attendance, cost, payroll, benefits, compliance, administration
    
Skillsoft
Published By: IBM     Published Date: Apr 18, 2012
This webcast features a conversation with Tom Lentz, Manager of IT and Finance for the Facilities Department at The Johns Hopkins Hospital in Baltimore, MD/USA. During this Webcast, Axendia Industry Analyst Daniel Matlis discusses with Mr. Lentz how The Johns Hopkins Hospital uses its Integrated Asset and Service Management solution to improve uptime to support patient care; control costs for procurement, maintenance, labor and materials; support regulatory compliance activities; and use workflow capabilities for internal controls.
Tags : 
healthcare, johns hopkins, cost, asset management, service management, ibm
    
IBM
Published By: Infoblox     Published Date: Jun 11, 2012
Companies require products that offload routine functions from the technology staff so that they can focus on more-important tasks. Download this whitepaper to learn what automation can do for you.
Tags : 
infoblox, time, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox
Start   Previous    46 47 48 49 50 51 52 53 54 55 56 57 58 59 60    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.