Skip to main content
 

it compliance

Results 1201 - 1225 of 1558Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
Aberdeen - youSENDit
Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to learn five key ways MFT makes a difference for your business.
Tags : 
seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server
    
SEEBURGER, Inc.
Published By: Kofax     Published Date: Sep 08, 2011
This whitepaper will review how business processes are more efficient in an electronic data environment. Enterprise Capture enables customer service improvement, cost cutting, and compliance for financial institutions such as Flagstar and Randolph Brooks Federal Credit Union (RBFCU).
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification
    
Kofax
Published By: VMware     Published Date: Aug 18, 2011
This executive level paper highlights trends and findings from CIO's 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter.
Tags : 
vmware, cloud security, trends, virtualized datacenter, compliance, cloud environments, cso, strategies
    
VMware
Published By: Osterman Research, Inc.     Published Date: Aug 16, 2011
Read this white paper to learn more about the risks, rewards, and potential pitfalls of social networking.
Tags : 
osterman research, social media, commvault, mcafee, live event, web 2.0 security, policies, archiving
    
Osterman Research, Inc.
Published By: nCircle     Published Date: Aug 16, 2011
Get Compliance & Security Metrics for Benchmarking and Trending
Tags : 
vulnerability management, ip360, security risk management, vulnerability assessment, discriminant analysis, network security management, network vulnerability, vulnerabilities and exposures
    
nCircle
Published By: Osterman Research, Inc.     Published Date: Aug 01, 2011
A recent survey by Osterman Research has confirmed that social media usage by employees has dramatically increased over the past few years. In short, you will leave this Webinar with a better understanding of the usage, trends, and diverse risks posed by social media.
Tags : 
osterman research, social media, commvault, mcafee, live event, web 2.0 security, policies, archiving
    
Osterman Research, Inc.
Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring, fim, report on compliance, roc
    
NetIQ
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
DigitalPersona UK
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
    
YouSendIt
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
    
YouSendIt
Published By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester
    
NetIQ
Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc
    
NetIQ
Published By: Akamai     Published Date: Jul 01, 2011
The whitepaper shows how merchants can rid their systems of sensitive payment information.
Tags : 
akamai, enterprise payment security 2.0, payment security management, edge tokenization, pci compliance, credit card data, cybersource, payment data capture
    
Akamai
Published By: SAP     Published Date: Jun 30, 2011
This white paper explores why today's executives still lack the relevant information or data quality to make decisions in a timely manner. Inside, learn about the biggest decisions-making challenges facings modern businesses and three keys to achieving better data-driven decisions.
Tags : 
sap, smbs, high-quality data, erp software solution, decision management, data visibility, data quality, corporate strategy
    
SAP
Published By: IBM Corporation     Published Date: Jun 30, 2011
IBM Tivoli Application Dependency Discovery Manager supports the alignment of IT and business with robust and automated application mapping and discovery that helps organizations understand the impact of change and meet compliance needs with detailed reporting and auditing.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc
    
IBM Corporation
Published By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneur's will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance
    
TriNet
Published By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneur's will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance
    
TriNet
Published By: TriNet     Published Date: Jun 13, 2011
Learn about key HR areas that ALL entrepreneurs will eventually face.
Tags : 
trinet, entrepreneur, cutting hr costs, increase productivity, human capital, hiring, human resources, improve performance
    
TriNet
Published By: The Logic Group     Published Date: Jun 07, 2011
If you are a business that accepts credit or debit card payments then achieving PCI DSS compliance is an industry requirement. But how can you make it work for your business & prevent it becoming an exercise in box ticking?
Tags : 
pci dss, compliance, credit card data, debit card data, customer data, retail, payments
    
The Logic Group
Start   Previous    42 43 44 45 46 47 48 49 50 51 52 53 54 55 56    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.