compliance

Results 1901 - 1925 of 1982Sort Results By: Published Date | Title | Company Name
Published By: NETIQ     Published Date: Sep 09, 2013
This white paper looks at the most important elements of securing sensitive health information and meeting HIPAA compliance requirements in a scalable and cost-effective way.
Tags : 
netiq, security, hipaa, compliance, protected health information, hitech act, compliance requirements, healthcare, software development, it management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet IT’s demands and simple for non-IT professionals to manage.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution that’s incomplete, unsecure and requires manual intervention— when what the business really needs is a complete, secure and automated solution?
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks, it management, knowledge management
    
NETIQ
Published By: ExtraHop     Published Date: Jul 25, 2013
ExtraHop enables healthcare IT organizations to harness the massive amounts of wire data flowing through their environments. See how ExtraHop can help to manage departmental and legacy applications while also supporting new initiatives such as meaningful use, compliance, VDI, EHR/EMR, and mobile applications.
Tags : 
operations, wire data, extrahop, applications, storage, compliance, vdi, mobile applciations, data management, business technology
    
ExtraHop
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands, security, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Sep 06, 2013
An Assessment Of The Current Security Landscape And How to Overcome It -- Technical information security skills are in higher demand today than ever before. As IT environments become more complex and the threat landscape grows more malicious , organizations need skilled technical staff to meet increasing security and compliance demands. Read this white paper and learn how to survive the technical security skills crisis.
Tags : 
forrester, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands, security, data management, business technology
    
IBM
Published By: IBM     Published Date: Sep 10, 2013
There is no fail-safe in today's digital world. Incidents will occur, both unintentional and malicious. To mitigate damage and organizational impact, the agile organization will respond quickly. To mitigate risks before damage occurs, an organization can maintain a continuous high state of security, ensure that all computing endpoints are in compliance, automate actions to shorten response time and enact measures to control infections with quarantine and until remediation is complete. Read this whitepaper to learn how IBM Endpoint Manager helps organizations respond quickly to today's threats.
Tags : 
proactive response, ibm, advanced persistent threats, agile organization, compliance, computing endpoints, digital world, endpoint management, endpoint software, mitigate risks, security, enterprise applications, data management, business technology
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
This IBM whitepaper prepares companies to face the impending complexities of the new FASB and IASB lease accounting standards. Learn how smart companies will move beyond the regulations alone and use the regulations as a springboard to transform the way they manage all their assets.
Tags : 
lease accounting, accounting, real estate, asset manager, ibm tririga, new accounting standard, fasb, iasb, compliance
    
IBM
Published By: IBM     Published Date: Nov 05, 2013
We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have “set a high bar” in the way they engage customers throughout the entire sales process—not just during the commercial transaction, but before, during and after the transaction. Your operations must be seamless, because individuals enjoy an interconnected and ubiquitous experience. And your operations must be insightful, because every personal and professional interaction is targeted and relevant. A Smarter Process approach helps you to reinvent business operations in the era of the customer.
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan, payer claims management, compliance management
    
IBM
Published By: IBM     Published Date: Feb 05, 2014
From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn how organizations managed risk, security and compliance with help from IBM.
Tags : 
    
IBM
Published By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : 
cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies, data management, data center
    
Cisco
Published By: nettime solutions     Published Date: Jan 27, 2014
Learn how automated time and attendance works, and how an Affordable Care Act module that was built specifically for managing ACA compliance can support multiple classes of employees in different policies.
Tags : 
time and attendance, cloud based time and attendance, aca compilance, affordable care act, saas time and attendance, workforce management, time off tracking, labor analytics
    
nettime solutions
Published By: nettime solutions     Published Date: Jan 27, 2014
In this 30-minute webinar, time and attendance leader nettime solutions will first break down the essentials of the healthcare law, and then dive into the ACA software module available in stratustime that will simplify your ACA compliance and ensure your team can focus on the objectives that matter most in your organization.
Tags : 
time and attendance, cloud based time and attendance, aca compliance, affordable care act, saas time and attendance, workforce management, time off tracking, labor analytics
    
nettime solutions
Published By: NAVEX Global     Published Date: Apr 15, 2016
Join us for a complimentary webinar where we will unveil the findings from the first ever NAVEX Global EMEA & APAC Whistleblowing Hotline Benchmark Report.
Tags : 
webinar, navex, data, benchmark, compliance programmes, compliance programme webinar
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 21, 2018
The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and compliance programmes through industry evidence and insights. Each programme is unique, with disparate risks and various levels of maturity, so not everything in this guide will apply to every programme. It is designed to help you perform a robust gap analysis of your unique programme and guide you through best practices to achieve the next level of programme sophistication right for your organisation.
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files, the right managed file transfer (MFT) solution can allow such transfers to continue without risking the security of the corporate network. The paper explains that the right MFT solution can enable business growth, enhance operational efficiency, enable compliance, reduce costs, and increase ROI. Choosing the right MFT solution requires eight considerations described in the paper, and concludes by explaining why Globalscape solutions are the choice of our customers around the world.
Tags : 
it management, data management
    
Globalscape
Published By: CEB     Published Date: May 19, 2014
Establishing compliance training requirements has always been difficult, but given recent changes to the regulatory and corporate work environments, the costs of failure are now more significant. To help companies get their training curricula right, CEB created a step-by-step guide to building a truly effective compliance training curriculum: one that reduces risk.
Tags : 
ceb, risk based compliance, training, reduce risk, regulatory changes, corporate work environments
    
CEB
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention, security intelligence, behavioral monitoring, asset discovery, threat detection
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Get Real-Time Threat Detection Starting on Day 1 with AlienVault USM Download a free, 30-day trial of AlienVault USM to experience the power of our all-in-one security platform. You’ll see how easy it can be to protect and defend against today’s threats with all of the essential security tools you need. Experience how USM makes it easy to: • Discover all IP-enabled assets on your network • Identify vulnerabilities like unpatched software or insecure configurations • Detect malware like botnets, trojans & rootkits • Speed incident response with remediation guidance for every alert • Generate accurate compliance reports for PCI DSS, HIPAA and more Download Your Free Trial Now!
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Jul 22, 2016
you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
    
AlienVault
Published By: Delphix     Published Date: Mar 24, 2015
With the recent spike in data theft and cybercrime, data masking is becoming an invaluable element of organization's security strategies. Delphix Agile Masking transforms secure data delivery, and enhances compliance and security while accelerating data management processes across the board.
Tags : 
    
Delphix
Published By: HP     Published Date: Nov 05, 2014
Microsoft® will end support for Windows® Server 2003/R2 on July 14, 2015. This can have a dramatic impact on your business, because without any more updates or patches from Microsoft, your organization’s infrastructure will be less stable and secure. HP can help you to make a smooth migration to Microsoft Windows Server 2012 and to private cloud solutions built on HP Converged Infrastructure and Microsoft System Center, HP has created a Microsoft Virtualization and Cloud Center of Excellence.
Tags : 
technology services, microsoft windows, microsoft migrations, stabilize infrastructure, secure infrastructure, compliance, detection systems, migrations, it management
    
HP
Start   Previous    66 67 68 69 70 71 72 73 74 75 76 77 78 79 80    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com