Share us:
> Research Library > Technology > Security > Compliance
 

Compliance

Results 351 - 375 of 496Sort Results By: Published Date | Title | Company Name
White Paper Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance
    
AirDefense
White Paper Published By: Blue Lane     Published Date: Apr 03, 2007
Find out how Blue Lane's unique approach can help health care IT pros quickly secure hard to patch servers.
Tags : 
ips, intrusion, patching, vulnerability, regulations
    
Blue Lane
White Paper Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system
    
Nemx Software Corporation
White Paper Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci
    
Secure Computing
White Paper Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system
    
Nemx Software Corporation
White Paper Published By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : 
pci, pci compliance, payment card, credit card, credit cards
    
Tripwire
White Paper Published By: NAVEX Global     Published Date: Apr 15, 2016
Join us for a complimentary webinar where we will unveil the findings from the first ever NAVEX Global EMEA & APAC Whistleblowing Hotline Benchmark Report.
Tags : 
webinar, navex, data, benchmark, compliance programmes
    
NAVEX Global
White Paper Published By: Thawte     Published Date: Dec 29, 2015
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.
Tags : 
security, apache, web server, digital certificate, business continuity
    
Thawte
Webinar Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management
    
AlienVault
White Paper Published By: AlienVault     Published Date: Aug 11, 2015
Read this paper to accelerate your evaluation of SOC tools and technology needs.
Tags : 
security operations center, soc, threat detection, soc tools, siem event correlation
    
AlienVault
White Paper Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology
    
AlienVault
White Paper Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Cisco
White Paper Published By: Windstream     Published Date: May 06, 2015
Read this Gartner report to learn how to keep business up and running no matter what.
Tags : 
business continuity, windstream, gartner, it service, analysis
    
Windstream
White Paper Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention
    
Mimecast
Webinar Published By: ServiceNow     Published Date: Apr 19, 2013
Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges.
Tags : 
software, lincense, compliance, software asset management, service management
    
ServiceNow
Case Study Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware
    
Websense
White Paper Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention, access control
    
IBM
White Paper Published By: IBM     Published Date: Jan 25, 2013
Educating Everyone To Guard the Cloud
Tags : 
security, cloud, ibm, access management, identity management
    
IBM
White Paper Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management
    
IBM
White Paper Published By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : 
reputational risk, business continuity, risk management, cloud, social media
    
IBM
White Paper Published By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Webinar Published By: BlackBerry     Published Date: Oct 03, 2012
Find out why these certifications matter to your organisation, and why they should be considered when protecting the information security of your mobile workforce.
Tags : 
security certifications, blackberry, mobile workforce, mobile security, blackberry
    
BlackBerry
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
There's a reason why the buzz around cloud computing never seems to die down. Concrete results are replacing the initial hype. Many organizations are taking advantage of private clouds which come with the accessibility of a public cloud and the security of a local server.
Tags : 
data, center, private, cloud, benefits
    
CDW Vmware
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : 
pci compliance, compliance, scriptlogic, pci, security standard
    
ScriptLogic
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service