Share us:
> Research Library > Technology > IT Management > Software Compliance
 

Software Compliance

Software licensing comprises the permissions, rights and restrictions imposed on software (whether a component or a free-standing program). Use of software without a license could constitute infringement of the owner's intellectual property rights, and allow the owner to sue the infringer.
Results 151 - 169 of 169Sort Results By:Published Date | Title | Company Name
White Paper Published By: Electric Cloud     Published Date: Aug 07, 2009
Drive quality earlier in the development process with continuous testing. Large development organizations have increasingly been adopting select agile practices to enable faster development, create more reliable software, and reduce costs. Chief among these practices is providing developers early and frequent feedback from users, from other developers, and especially from the programming, build, and test tools. In the latter category, continuous integration and continuous testing are emerging as valuable techniques for identifying errors early so they can be corrected immediately by the developer who made the code changes.
Tags : 
software development, electriccommander, electric cloud, continuous testing, development
    
Electric Cloud
White Paper Published By: Tripwire     Published Date: Jun 30, 2009
Learn how Tripwire can help you deploy a comprehensive configuration assessment and control solution that: a) reduces the time and resources required to verify compliance and prepare for audits; and b) maintains continuous compliance by allowing IT to immediately identify any exceptions and trigger remediation of configurations that do not conform to policy.
Tags : 
tripwire, automate, fisma, compliance, configuration
    
Tripwire
White Paper Published By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : 
ibm, pci dss, compliance, security, software compliance
    
IBM
White Paper Published By: Aldon     Published Date: Jan 13, 2009
Learn how automated tracking can significantly cut compliance costs.
Tags : 
aldon, compliance costs, automated tracking, it compliance, automated applications
    
Aldon
White Paper Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci
    
Secure Computing
White Paper Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system
    
Nemx Software Corporation
White Paper Published By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : 
risk assessment, compliance assessment, risk management, security, it management
    
RiskWatch
White Paper Published By: IBM     Published Date: Dec 12, 2006
This white paper outlines the components of the Banking Data Warehouse (BDW) and how they assist financial institutions in addressing the data modeling and data consolidation issues relating to the SOX regulations.
Tags : 
data warehousing, database warehousing, data consolidation, sarbanes oxley compliance, sox
    
IBM
White Paper Published By: IBM     Published Date: Dec 12, 2006
This white paper will outline the components of the Banking Data Warehouse (BDW) and how they assist financial institutions to address the data modeling and data consolidation issues relating to the Basel II Capital Accord. 
Tags : 
data warehousing, bdw, banking data warehousing, compliance, risk management
    
IBM
White Paper Published By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes some easy-to-use data management tools that many companies are using to let business users do complex data updates and reporting tasks effortlessly. This technology is not only easing their Sarbanes-Oxley compliance, but is also saving these companies large amounts of time and money.
Tags : 
compliance, sox, sarbanes, sarbox, sarbanes-oxley
    
Winshuttle
White Paper Published By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : 
application security, vulnerabilities, vulnerability management, security complinace, compliance
    
Cenzic
White Paper Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : 
identity theft, application security, password management, security management, compliance
    
Cenzic
White Paper Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance
    
Cenzic
White Paper Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management
    
Cenzic
White Paper Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy
    
NetIQ Corporation
White Paper Published By: KACE     Published Date: Nov 14, 2006
How is HIPAA Security Rule compliance impacting your IT department?  This paper explores some solutions.
Tags : 
hipaa, compliance, hipaa compliance, healthcare, privacy
    
KACE
White Paper Published By: Evolveware     Published Date: Nov 06, 2006
Software analysis, documentation, migration, upgrades or replacements are daunting and risky endeavors because they are primarily manual and time-consuming. EvolveWare’s S2T Technology provides a solution to these problems with tools that automate the process up to 90%, thus reducing the time and cost of such initiatives by as much as 40-60%.
Tags : 
software analysis, software documentation, software migration, migration, software upgrades
    
Evolveware
White Paper Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy
    
Aomega
White Paper Published By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : 
hipaa compliance, ip faxing, ip networks, records management, information management
    
Castelle
Start   Previous    1 2 3 4 5 6 7     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service