Compliance

Results 301 - 325 of 497Sort Results By: Published Date | Title | Company Name
By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : fortify, open source, business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, compliance, ebusiness
     HP - Enterprise
By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, compliance, firewalls
     HP - Enterprise
By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : secnap, network security, data security, compliance, osi, malware, antispam, anti-spam, cybercrime, security, data protection, database security
     SECNAP Network Security Corporation
By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, compliance, security management, data protection, pci compliance
     TriGeo Network Security
By: IBM     Published Date: Sep 18, 2008
Unique serial numbers must now be applied to individual bottles of drugs and the cases that carry them in California, due to new tracking requirements. Read this white paper to learn how the IBM Serialization Pilot Kit with TAGSYS RFID is helping companies achieve compliance in less than a year.
Tags : compliance, rfid, radio frequency, ibm, ibm mmdg, inventory, wireless
     IBM
By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : ca mainframe, mainframe, compliance, network performance, servers
     CA Mainframe
By: GFI     Published Date: Sep 04, 2008
Today, more than ever before, legal and compliance issues are driving the case for email archiving. Email archiving legislation is complex and varies greatly from country to country. Unless companies are well versed in compliance law, the various regulations affecting email can be a minefield.
Tags : gfi, sox, sox compliance, sarbox, sarbanes oxley, sarbanes-oxley, compliance, email, email archive, email archiving, archiving, archive, storage, sarbanes oxley compliance
     GFI
By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : messagelabs, compliance, email policies, policy, enforce policy, email security, security policies, secure instant messaging
     MessageLabs
By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, data encryption, encryption, security, compliance, pci compliance
     Utimaco
By: Entrust Datacard     Published Date: Jul 30, 2008
Experts agree that username/password authentication does not provide enough protection against unauthorized access. CIOs are challenged to increase authentication security while preserving operational and budget efficiency.
Tags : layered security, versatile authentication, mutual authentication, enterprise authentication, entrust identityguard, entrust, identity management, iam, authentication, compliance, password management, security management, best practices
     Entrust Datacard
By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical, storage management, compliance, data protection, pci compliance
     HP
By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : tripwire, iso, iso 27001, security, compliance, comply, isms, information security, configuration management
     Tripwire
By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : tripwire, information security, infrastructure, change management, change, change auditing, security, auditing, compliance, data protection
     Tripwire
By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : tripwire, configuration, compliance, infrastructure, network management, configuration management
     Tripwire
By: IBM     Published Date: May 12, 2008
Managing compliance is a huge challenge for companies, straining IT resources needed to meet service level agreements. To overcome these challenges, IT must support the objectives of your business. This white paper describes how IBM Service Management does just that. It defines and monitors IT governance and compliance management in a repeatable manner across businesses of any size.
Tags : service, service management, sla, service level, ibm, ibm g&rm, ibm grm, compliance
     IBM
By: CA WA     Published Date: May 12, 2008
The recent economic downturn and corporate scandals compounded concerns of corporate accountability and confidence in U.S businesses. To improve shareholder confidence in management’s ability to self-govern, the Federal Government implemented strict regulatory protocols to help restore accountability and improve public as well as shareholder confidence. The primary example of course is the Sarbanes-Oxley (SOX) Act of 2002 which sought lasting eradication of corporate corruption by implementing specific controls across key financial business processes.
Tags : ca wa, workload automation, business process automation, compliance, sox, sarbox, sarbanes oxley
     CA WA
By: IBM     Published Date: Mar 28, 2008
Along with its many benefits in creating and connecting new services and reducing complexities, the openness of an SOA also creates security and compliance challenges.
Tags : compliance, identity management, service oriented architecture
     IBM
By: Oce Business Services     Published Date: Mar 24, 2008
Effective records management has never been more crucial to meeting corporate governance, risk management and operational mandates. Yet half of enterprises lack a fully implemented records management program. Download this white paper to learn how strategic outsourcing can help you mitigate risks, apply best practices, meet compliance mandates and improve overall records management ROI.
Tags : oce, records management, knowledge management, compliance, best practices, document management, information management
     Oce Business Services
By: IBM     Published Date: Feb 25, 2008
Going green is becoming more than an altruistic aspiration to save the planet. A proactive corporate environmental policy is now an essential part of any company’s overall business strategy. Download this paper to find out how IBM can help you to support environmental initiatives while achieving your company's long-term business goals.
Tags : green, environment, environmental, compliance, cost, green strategy, ibm, it management, spend management, green computing
     IBM
By: IBM     Published Date: Feb 25, 2008
Transitioning to a green data center and optimizing operating efficiency can be a complex undertaking. There are multiple components to factor into the equation—and best results can often be achieved by integrating improvements from multiple fronts. The good news is that IBM can provide many solutions and techniques to support such a transition.
Tags : green, environment, environmental, compliance, cost, green strategy, datacenter, data center, ibm, it management, network management, spend management, green computing
     IBM
By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : bank, banks, financial, financial institutions, fisma, compliance, data security, information management, information security, database security, customer data, ibm, network security, data protection
     IBM
By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, intrusion prevention, pci compliance
     Secure Computing
By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx, security, firewalls, intrusion prevention, pci compliance
     Secure Computing
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa, corporate governance
     Aveksa
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.