Skip to main content
 

it compliance

Results 1301 - 1325 of 1505Sort Results By: Published Date | Title | Company Name
Published By: Skillsoft     Published Date: May 19, 2015
This report focuses on the consumers perspective in relation to understanding business ethics and integrity.
Tags : 
business ethics and integrity, compliance programs, skillsoft
    
Skillsoft
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving
    
Smarsh
Published By: Smarsh     Published Date: Feb 27, 2014
More organizations are deploying and migrating their information archiving to the cloud. In this report, The Radicati Group provides an overall market evaluation of 10 leading Cloud archiving providers, tips for selecting an information archiving solution and the opportunities and challenges that compliance, IT and legal professionals experience when choosing an information archiving platform.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention
    
Smarsh
Published By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention
    
Smarsh
Published By: Smarsh     Published Date: Dec 07, 2016
Text messaging is simple, concise and compatible with virtually every mobile device, operating system and wireless carrier, making it very appealing to financial advisors and their customers. However, if used for business communications, texts can create tremendous risk. Less than a third of financial firms have a text supervision solution in place according to the Smarsh 2016 Electronic Communications Compliance Survey, the largest compliance gap facing financial firms today. Text messaging can’t be ignored by firms any longer.
Tags : 
    
Smarsh
Published By: Smarsh     Published Date: Dec 07, 2016
To meet the requirements of FINRA & SEC, you must first understand what they require of investment firms and organizations. Better yet, you must understand what is classified as a violation of those rules, then put practices in play that mitigate the risk and position you as an active advocate for compliance— not a violator or passive enabler for non-compliant activity.
Tags : 
    
Smarsh
Published By: Smarsh     Published Date: Dec 07, 2016
For companies in highly regulated or litigious industries, it’s now more important than ever to understand how compliance and legal departments can work together to share information, reduce inefficiencies, overcome challenges, and align technologies.
Tags : 
    
Smarsh
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
If you are spending too much time and money on SOX compliance, this white paper will help you identify where investments in technology could really pay off in time for your next SOX audit.
Tags : 
compliance, sarbox, sox, sarbanes oxley, sarbanes-oxley, sox compliance, sox audit, change management, access control, softlanding, soft landing
    
SoftLanding Systems
Published By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : 
pci data, credit card, payment card, pci, compliance, privacy, customer information, data security, database security, solidcore, solid core
    
Solidcore
Published By: Solidcore     Published Date: Aug 21, 2009
This white paper outlines the issues faced by IT managers in meeting their compliance requirements and explains how Solidcore can be a core component of a sustainable and cost-effective SOX compliance program.
Tags : 
sox, sox compliance, sarbox, sarbanes oxley, archiving, finance, cost control, solid core, solidcore
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.
Tags : 
pci, pci dss, pci compliance, compliance, payment card, credit card, data protection, data security, database security, cost of non-compliance, customer data, solidcore, fortrex
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
It is widely acknowledged that unauthorized changes made to an IT Infrastructure cause up to 80% of system unavailability.  Learn how adding change control to your existing or planned change management infrastructure can help improve IT service availability, lower compliance costs, and accelerate your ITIL implementations.
Tags : 
control change, change management, high availability, change control, sla, service level, solidcore, infrastructure, itil
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management, configuration management, solidcore, fortrex, infrastructure, risk management
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
This paper lays out the challenges with complying with SOX and suggests a radical solution: build a self-service, automated IT control framework in which all the information required to verify compliance is available in a single reporting system.
Tags : 
compliance, sox, sox compliance, sarbox, sarbox compliance, audit, self audit, self auditing, change management, it controls, solidcore
    
Solidcore
Published By: Solidcore     Published Date: Jan 15, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. These PCI requirements exist to protect sensitive data - yet, research indicates that these are among the least satisfied requirements across Level 1 merchants, with almost 40% non-compliance. 
Tags : 
    
Solidcore
Published By: Sophos     Published Date: Jul 15, 2013
This MDM buyers guide will walk you through the process of selecting the right mobile device management solution that fits your company’s BYOD objectives. It explains how an effective MDM system can support an organization's workforce mobility strategy, ensure compliance, and provide central management of devices and apps while supporting easy administration.
Tags : 
sophos, byod, buyers guide, mobile device management, mobile device, android, windows 8, mobile, security, data protection
    
Sophos
Published By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : 
securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes, ddos, denial of service
    
SPAN Systems
Published By: Splunk     Published Date: Apr 16, 2012
Discover a unique approach to handling large, semi-structured or unstructured time-series data. Splunk can be deployed in a matter of days to provide rapid cross-correlation between different data types-giving you unprecedented operational visibility.
Tags : 
splunk, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance, log management operations, operations, operational intelligence
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
This analyst ROI case study reveals how Ongame, a leading online gaming platform, used Splunk to gain greater visibility and efficiency from their application production process. Discover how Ongame improved DevOps collaboration and reduced downtime.
Tags : 
splunk, ongame, gaming, gaming platform, devops, collaboration, downtime, efficiency, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
Using Splunk, Cricket was able to identify system degradation and failures, even in the application area of Cricket's highly-automated and virtualized environment. Read about Cricket's impressive hard and soft ROI.
Tags : 
splunk, cricket communications, virtualization, automation, customer behavior, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance, log management operations, operations
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : 
splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance
    
Splunk
Published By: Splunk     Published Date: Aug 21, 2018
How can you utilize machine data to support compliance with the General Data Protection Regulation of the European Union? This white paper, “How Machine Data Supports GDPR Compliance”, answers this question and identifies three use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment – on-premises, in the cloud or hybrid Download the white paper to: *Master the risks necessary to be prepared for GDPR through real-world scenarios *Understand which articles of GDPR will impact your business *Learn how machine data can help you overcome those requirements
Tags : 
    
Splunk
Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk
Published By: Splunk     Published Date: Aug 22, 2018
Gartner's “2017 Critical Capabilities for Security Information and Event Management” report assesses eight SIEM capabilities against the increasingly complex vendor landscape. The conclusion? Splunk had the highest score in the Security Monitoring use case. We believe customers rely on Splunk’s advanced security analytics capabilities to meet their SIEM and security intelligence needs — improving threat detection, investigation and time to remediation. It’s proven to help with compliance and incident reporting, automated alerting of common security events and historical analysis for detected incidents. CISOs, CIOs, and security and risk leaders should download Gartner’s annual report to make the best-informed buying decision for security and learn about Splunk’s leadership position in the market.
Tags : 
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Start   Previous    46 47 48 49 50 51 52 53 54 55 56 57 58 59 60    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.