Skip to main content
 

it compliance

Results 1151 - 1175 of 1547Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Angreifer gehen heute kreativ vor und nutzen automatisierte Tools, um in Profilen bei sozialen Netzwerken (die häufig öffentlich zugänglich sind) nach Informationen über ihre Opfer zu suchen. Die Angreifer wissen daher, wo Sie arbeiten (und in welcher Position), ob Sie verheiratet sind und wo Sie in der Vergangenheit gearbeitet haben. Sie kennen Ihre Interessen, Hobbys und viele weitere Details. All diese Informationen werden zum Verfassen äußerst überzeugender E-Mail-Nachrichten verwendet, die Sie zum Klicken auf eine schädliche URL oder angehängte Datei verleiten sollen. Und sobald Sie geklickt haben, werden die Schaddaten auf Ihrem System abgelegt.
Tags : 
phishing, malware, bec, angriffe zielen auf menschen ab, für sicherheitsteams
    
Proofpoint
Published By: PTC     Published Date: Aug 21, 2009
Download this report on how to implement a successful environmental compliance strategy for the long term. Learn about new strategies for complying with upcoming environmental regulations, as well as the compliance shortcomings common to many companies in a new research report by AberdeenGroup.
Tags : 
compliance, environmentalism, epa, manufacturing, responsibility, consumer electronics, ptc
    
PTC
Published By: PulseSecure     Published Date: Apr 01, 2015
Learn how to enable fast and secure network, cloud, and application access in order to maximize productivity for those employees who work remotely or are constantly travelling.
Tags : 
mobile connectivity, byod, device security, policy compliance, enduser, pulse secure, mobile worker
    
PulseSecure
Published By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
    
Puppet
Published By: PwC     Published Date: May 14, 2019
Coding errors are common--and costly. There were $2.91B in OIG investigative recoveries for FY18 alone. Hospitals need to catch coding errors prior to billing, or risk heavy fines, legal issues and even a damaged reputation. What if you could catch coding errors prior to billing? PwC SMART increases the efficiency and effectiveness of inpatient and outpatient coding quality evaluation process, and enables a mechanism for quality and compliance review. See how SMART led to $1.8M in net reimbursement impact for a network of independent healthcare providers in New Jersey, and learn more about the inpatient and outpatient solutions.
Tags : 
    
PwC
Published By: PwC     Published Date: Aug 28, 2019
Companies typically begin with a basic approach to sales tax: figure out the requirements of the state in which they’re headquartered, register with that state, and start collecting sales tax from customers in that state. That approach may work for a while, but as your business expands into new states (whether you have a physical presence there or not), the risk of non-compliance with sales tax becomes significant. Smart finance leaders know they need to have a sales tax compliance strategy before they start getting notices from state tax authorities.
Tags : 
    
PwC
Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence
    
Q1 Labs
Published By: Q2 eBanking     Published Date: Jul 30, 2017
Banks and credit unions face multiple challenges to operational efficiency: tightening budgets, limited headcount, a challenging regulatory climate, ongoing security concerns and others. Efficiency and process enhancements can limit the impact these challenges could have on your institution. The following five questions—and your responses—may help your financial institution (FI) as you look to drive operational efficiencies, improve compliance and security, keep account holders happy and attract new ones.
Tags : 
    
Q2 eBanking
Published By: QTS     Published Date: Nov 04, 2016
Watch this video to hear from American Hacker, Jeff Moss, about the security threats faced by companies today!
Tags : 
information security, security threats, data security
    
QTS
Published By: QTS Data Centers     Published Date: Apr 28, 2015
In this white paper, 451 Research looks into the cloud to see what’s driving the purchase of cloud security technologies.
Tags : 
cloud security, macro trends, budget trends, compliance, security pain points
    
QTS Data Centers
Published By: QTS Data Centers     Published Date: Feb 17, 2017
This white paper provides an in-depth look at key considerations to keep in mind when selecting a data center provider in Chicago. From connectivity to compliance to customer service, these 7 key considerations offer a checklist for evaluating potential data center providers.
Tags : 
    
QTS Data Centers
Published By: Qualys     Published Date: Feb 22, 2010
This book is a quick guide to understanding IT policy compliance. It surveys the best steps for preparing your organization's IT operations to comply with laws and regulations - and how to prove compliance to an auditor.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys
Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection
    
Qualys
Published By: Qualys     Published Date: May 07, 2014
Learn how to easily pass an audit and see how you can better prepare the analyst in charge to be more productive by focusing time on analyzing the data and staying ahead of the audit curve.
Tags : 
qualys, it audit, it security, compliance, secure data, pass audit, prepare for audit, finance
    
Qualys
Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices
    
Qualys
Published By: Qualys     Published Date: Jan 08, 2015
Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs. This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.
Tags : 
cloud solutions, security, secure data centers, it risks, compliance
    
Qualys
Published By: Qualys     Published Date: Jun 02, 2015
In this guide, Qualys describes internal risks to IT security and three best practices to control incorrect configurations. Critical components to this include automation of assessments and prioritization of risks. By using the automation technology in Qualys Policy Compliance, organizations can ensure the safety of sensitive data and IT while meeting mandates for compliance.
Tags : 
security gap, automated configuration assessment, it security, compliance
    
Qualys
Published By: Qualys     Published Date: Jun 02, 2015
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.
Tags : 
continuous monitoring, continuous security, potential threat identification, system configurations
    
Qualys
Published By: Qualys     Published Date: Feb 17, 2016
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security technologies. In the context of today’s distributed enterprise, however, it’s essential. Since the apps, systems, and services your users access to conduct business are already in the cloud, it makes sense to consider looking to cloud-based technologies to keep track of them all. For the security and compliance professional, it’s critical to have access to a reliable and accurate asset inventory, especially when investigating security incidents and verifying and demonstrating compliance.
Tags : 
qualys, security technology, cloud based technology, best practices
    
Qualys
Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security
    
Qualys
Start   Previous    40 41 42 43 44 45 46 47 48 49 50 51 52 53 54    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.