Compliance

Results 126 - 150 of 497Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of todayís dynamic threat landscape.
Tags : big data, big security data, mcafee siem, intrusion detection systems, security monitoring, anti spyware, anti virus, application security, auditing, compliance, encryption, intrusion detection, intrusion prevention, security management, best practices, business activity monitoring, business analytics, business intelligence, configuration management, data integration
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, email security, encryption, hacker detection, identity management, internet security
     McAfee
By: ZirMed     Published Date: Feb 05, 2013
This white paper examines the issues and risks surrounding compliance and reimbursement, and how a management tool can help you avoid them.
Tags : compliance, medicare, medicare, reimbursement, claims management, claims, coding
     ZirMed
By: Symantec     Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests.
Tags : endpoint protection, security, performance test, comparison, windows 8, anti spam, anti spyware, anti virus, auditing, authentication, business continuity, compliance, disaster recovery, email security, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, security management
     Symantec
By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : mobile, vulnerability, byod, dast, sast, testing, risk management, security management, anti spyware, anti virus, business continuity, compliance, email security, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, network security appliance
     HP - Enterprise
By: HP - Enterprise     Published Date: Jan 24, 2013
Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world thatís evolving faster than ever before. Read this dossier to find out more.
Tags : consumerization, byod, risk management, security, anti spam, anti spyware, anti virus, authentication, business continuity, compliance, disaster recovery, email security, encryption, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management
     HP - Enterprise
By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where youíre still unprotected and what you need to do complete your security portfolio.
Tags : security, network security, enterprise, infrastructure, best practices, vulnerability, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, compliance, disaster recovery, email security, encryption, firewalls, hacker detection, internet security
     HP - Enterprise
By: HP - Enterprise     Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where youíre still unprotected and what you need to do complete your security portfolio.
Tags : security, compliance, mobile, tablets, byod, cloud, access control, anti spyware, anti virus, application security, auditing, business continuity, disaster recovery, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
     HP - Enterprise
By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, Iíll look at everything thatís new as far as security in Windows 8, with a special focus on mobility.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile, byod, windows rt, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, email security, encryption, firewalls
     Lumension
By: Lumension     Published Date: Jan 22, 2013
In this webinar, Randy Franklin Smith (Ultimate Windows Security) shows how application control is an important defense-in-depth measure that can provide detection and prevention of late-stage APT attacks.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, detection, apt attacks, malware, servers, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, email security, encryption, firewalls
     Lumension
By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms Ė and quantifies Ė the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
     Lumension
By: Lumension     Published Date: Jan 22, 2013
You just canít cut corners today. In fact you need to be very careful about even ďoptimizingĒ your security efforts because itís so easy to misjudge what needs to be secured and what doesnít; what deserves your attention and what doesnít.
Tags : endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spyware, anti virus, application security, auditing, business continuity, encryption, hacker detection, best practices
     Lumension
By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : best practices, devices control, encryption, security, business continuity, access control, anti spam, anti spyware, anti virus, application security, auditing, compliance, security management, security policies, application integration, business activity monitoring, vulnerability management
     Lumension
By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you canít leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : software updates, security, patch, network security, patch management, remediation solutions, access control, anti spam, anti spyware, anti virus, application security, business continuity, compliance, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, network security appliance
     Lumension
By: Lumension     Published Date: Jan 18, 2013
Adobe's code-signing infrastructure got hacked and now you have to worry about some really bad software out there that your computers will think are valid, safe applications from Adobe. One of them is pwdump which gets Windows passwords.
Tags : security, network security, cyber attacks, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, security management
     Lumension
By: Lumension     Published Date: Jan 18, 2013
HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?
Tags : hipaaa, hitech act, compliance, cyber liability, healthcare data, data compliance, access control, application security, auditing, encryption, firewalls, internet security, intrusion prevention, best practices, data protection, database security
     Lumension
By: Lumension     Published Date: Jan 18, 2013
Watch this webcast to learn the recommended steps to check unknown executables on your endpoints as we dive into a technical discussion of what the critical items to address
Tags : whitelisting, endpoint security, av signatures, patch management, compliance, encryption, network security appliance, security management, vulnerability management
     Lumension
By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : compliance, security, policy, group policy, access control, security management, best practices, desktop management
     Lumension
By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management, storage management, access control, application security, compliance, intrusion detection, mobile computing, mobile workers, total cost of ownership, windows, windows server, web service management, employee performance
     AppSense
By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : database, security, mcafee, data breach, compliance, ipsec, password management, database security, pci compliance
     McAfee
By: NetIQ     Published Date: Nov 01, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : iag, identity management, access governance, it security, compliance
     NetIQ
By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper for an in-depth look at how enterprises view compliance over
Tags : security compliance, user access management, it management, compliance
     NetIQ
By: Oracle Corp.     Published Date: Oct 15, 2012
Please join Tom Kyte, of the AskTom column and Senior Technical Architect at Oracle, to learn about the threats every IT Database and Security administrator needs to be aware of. Tom will also discuss best practices for securing your databases.
Tags : database security, compliance, sql, it security, oracle, software compliance
     Oracle Corp.
By: Oracle Corp.     Published Date: Oct 15, 2012
Steve Moyle, CTO of Oracle Database Firewall, explains the best practices for efficient database activity monitoring, alerting and blocking that can help prevent SQL injection attacks and other threats from reaching your enterprise databases.
Tags : oracle, sql injection, database activity monitoring, database security, it security, compliance, security management
     Oracle Corp.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.