regulatory compliance

Results 151 - 175 of 227Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Dell Storage     Published Date: Mar 06, 2012
By enabling organizations to centralize desktop deployment, a VDI can help simplify admin and reduce costs while enhancing security and regulatory compliance and increasing IT flexibility and business agility. Don't wait - find out more now.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure, vdi
    
Dell Storage
Published By: DocuLex     Published Date: Jan 27, 2012
Automotive Dealer solution to affordable protection of customer files from identity theft and legal exposure.
Tags : 
    
DocuLex
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
Find out why fixing 3rd-party app vulnerabilities is at the core of IT security-and how to make sure patch management is optimizing your security.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: CenturyLink     Published Date: Nov 18, 2011
Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, disaster, threats, downtime, regulatory, compliance, bcdr, business continutity, protection
    
CenturyLink
Published By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : 
ibm, guardium, technology, data, security, privacy, risk reduction
    
IBM Corporation
Published By: IBM Corp     Published Date: Sep 23, 2011
This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions address regulatory compliance.
Tags : 
ibm, smb, backup, technology, data recovery, archive
    
IBM Corp
Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc, audit, regulatory compliance
    
NetIQ
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci, pc ftp application, script file exposure, file encryption processes
    
Linoma Software
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
Tags : 
watchguard xcs, securemail encryption, email encryption, ibe, data loss over e-mail, compliance, identity-based encryption
    
WatchGuard Technologies
Published By: Dell SecureWorks     Published Date: Apr 11, 2011
Read this whitepaper to understand how Dell SecureWorks can help your midsize organization improve security, increase operational efficiency and demonstrate compliance with regulatory requirements, allowing you to focus on the priorities and strategic projects that drive your business.
Tags : 
dell secureworks, internet security, compliance, regulatory compliance, vulnerability, security intelligence, global threats, cyber attack
    
Dell SecureWorks
Published By: GFI Software     Published Date: Mar 21, 2011
Companies' dependency on email to do business brings with it various problems. Storage limitations, backups, problematic PST files, access to old emails and regulatory compliance or eDiscovery requests are a few issues that arise. Failure to address these effectively could have serious repercussions for the organization.
Tags : 
gfi, email archiving, backups, storage, pst files, regulatory compliance, ediscovery, exchange server, email management software
    
GFI Software
Published By: Cornerstone OnDemand     Published Date: Feb 24, 2011
GECU has the challenge of operating within one of the nation's most highly regulated industries, and as a result, has long understood that efficient processes for employee training, development and performance management are critical pillars for supporting long-term financial growth within a strict regulatory and compliance environment. Read more to find out why GECU chose Cornerstone OnDemand.
Tags : 
cornerstone, gecu, compliance, employee development, training, web-based training
    
Cornerstone OnDemand
Published By: IBM     Published Date: Dec 07, 2010
Case Management and the Implications in the Healthcare industry.
Tags : 
ibm, enterprise content management, advanced case management, healthcare agencies, automation, customer service, regulatory compliance, content and process management, analytics
    
IBM
Published By: Quest Software, Inc.     Published Date: Nov 18, 2010
This white paper describes how real organizations have handled these challenges and how a strong and reliable messaging solution like Quest Recovery Manager for Exchange could have mitigated risk, reduced cost, and improved regulatory compliance.
Tags : 
quest software, messaging, microsoft exchange server, quest recovery manager, business communication, migration, consolidation
    
Quest Software, Inc.
Published By: GSS Infotech     Published Date: Nov 11, 2010
The purpose of this paper is to provide a clear understanding of HIPAA and ICD migration, analyze the benefits beyond ICD remediation by providing regulation insights, and discuss the impact of the new regulations on systems,
Tags : 
healthcare, healthcare regulation, icd 10, icd challenges, icd transition, hipaa, hipaa 5010 migration, e-learning tool, testing services, icd 10 testing, icd codes, icd coding guidelines, icd classification, icd training, icd certification, icd 10 implementation, icd 9-10, hipaa certification, hipaa training, hipaa compliance
    
GSS Infotech
Published By: Symantec.cloud     Published Date: Aug 10, 2010
Off-the-shelf instant messaging (IM) lets malware into the Enterprise, and compromises regulatory compliance and copyright protection. Find out how a secure IM service can keep you covered.
Tags : 
messagelabs us, instant messaging, malware, information mobile worker, saas, security risk
    
Symantec.cloud
Published By: SafeNet     Published Date: Jul 13, 2010
To add extra protection for confidential data while reducing the time and cost for achieving regulatory compliance, many organizations will benefit from integrating tokenization into their SafeNet solution.
Tags : 
safenet, tokenization, data protection, regulatory compliance, application integration, encryption, audit
    
SafeNet
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.