Skip to main content
 

it compliance

Results 1251 - 1275 of 1506Sort Results By: Published Date | Title | Company Name
Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi, malware, antispam, anti-spam
    
SECNAP Network Security Corporation
Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance
    
Secure Computing
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
    
Secure Computing
Published By: Secure Passage     Published Date: Sep 29, 2010
Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity
Tags : 
firewall, firewall management, network security management, firewall migration, compliance, it security
    
Secure Passage
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to learn five key ways MFT makes a difference for your business.
Tags : 
seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
    
SEEBURGER, Inc.
Published By: SEEBURGER, Inc.     Published Date: Feb 16, 2012
Traditional methods of managing file transfers can't prevent or protect your enterprise from compliance violations: they're insecure, inefficient, and non-auditable.
Tags : 
seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
    
SEEBURGER, Inc.
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation
    
Selligent Marketing Cloud
Published By: ServiceNow     Published Date: Nov 05, 2012
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
itam, servicenow, it asset management, software asset management, sam, security, drive standardization
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 12, 2013
Organizations are faced with many auditing challenges and often find themselves defining controls in documents and spreadsheets, manually tracking audit task assignments and storing audit documentation in disparate locations. With the ServiceNow IT GRC functionality, organizations gain a central repository that contains policies, risks, controls, findings and more all in one place. It also provides a way to automate audit tasks for remediation efforts and a dashboard view to manage the entire audit process. Learn more during this upcoming webinar.
Tags : 
it governance, risk, compliance, servicenow, webinar
    
ServiceNow
Published By: ServiceNow     Published Date: Jul 24, 2013
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
asset management, technology, software asset management, compliance, mitigation of security risks, automation
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 26, 2014
Learn how creating a great service catalog can help alleviate the pressure of demonstrating the value of IT to the business and why many consider it to be fundamental to any IT improvement initiative.
Tags : 
service catalog, visibility, it value, compliance, service management
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 24, 2015
Decision makers at many organizations question the investments made in IT. This is often because they don’t fully understand the value delivered by IT service management (ITSM) or by compliance with recommended best practices such as those defined by the IT Infrastructure Library or ITIL®. This often pressures CIOs to demonstrate the value of IT to the business. Learn how creating a great service catalog can help alleviate these pressures and why many consider it to be fundamental to any IT improvement initiative. An effective service catalog enables IT to deliver business services that are more customer and service focused, which results in higher customer satisfaction, provides standardization and consistency and increases IT visibility across the organization.
Tags : 
it visibility, it service management, compliance, it infrastructure, business services, it visibility
    
ServiceNow
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Fortunately, Shavlik Technologies takes the sting out of the patch management process, while at the same time accelerating and continuously improving security and compliance readiness.
Tags : 
shavlik, patch management, security vulnerabilities, compliance, networking, automation
    
Shavlik Technologies
Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
Shavlik Technologies
Start   Previous    44 45 46 47 48 49 50 51 52 53 54 55 56 57 58    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.