Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

compliance standards

Results 26 - 50 of 58Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases
    
McAfee
Published By: Tripp Lite     Published Date: May 17, 2016
While the use of power strips in healthcare and medical facilities is common, the misuse of these devices is also common. Such misuse can result in citations, fines, or even patient injury at your facility. This white paper covers: ē Common mistakes in the use of power strips ē Ways to avoid making the common mistakes ē How to develop and implement a power strip policy to ensure that your facility complies with codes and standards while reducing risk to patients and staff
Tags : 
compliance, safety, power strip, codes, standards, citations, fines, patient injury, medical facilities, healthcare
    
Tripp Lite
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Compliance is a fast-moving target, and itís getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation
Published By: Westex     Published Date: Aug 01, 2018
Meeting the needs of compliance standards while keeping your workers protected is a top priority for those in the electrical industry. There are a number of measures you can take to help keep your workers safe, starting with a sound personal protective equipment (PPE) program. In this new white paper, we detail the key changes found in the 2018 edition of NFPA 70E, and explain how daily wear PPE may help enhance both compliance and worker protection when compared to traditional task-based PPE.
Tags : 
nfpa, nfpa 70e, arc flash, ppe, flame resitance, arc resistance, fr fabric
    
Westex
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : 
pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware, and software, achieving pci standards compliance, protect against security breaches
    
NeoSpire Managed Hosting
Published By: AWS     Published Date: Aug 15, 2018
Earning and keeping your customerís trust is one key to long-term success. In todayís digital world, your customers expect product and service innovations at an increasingly rapid pace. At the same time, customer privacy and data security are under close scrutiny. These trends help to explain why organizations are migrating to Amazon Web Services (AWS): to benefit from the agility, scalability, and security that it offers. AWS has always put cloud security first. This security-centric approach not only helps you more effectively protect your data on AWS, but can also help you meet security and compliance standards.
Tags : 
    
AWS
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Be sure your site is in compliance with government data regulations by reading about the different data regulatory standards in this white paper. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, trust, security, compliance, pci, hippaa, sarbanes-oxley, fisma, sox, security, data, data security
    
VeriSign Incorp.
Published By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to todayís security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365órelieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
    
Microsoft Office 365
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions havenít caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that donít allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions havenít caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that donít allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : 
vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards, network management, network performance management
    
BitSight Technologies
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : 
tripwire, configuration, compliance, infrastructure, network management
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: Tripwire     Published Date: Jan 20, 2010
Gene Kim, CTO of Tripwire, describes seven practical steps owners and operators of the bulk power system can take to meet the mandatory IT configuration requirements set forth in the NERC-CIP standards. These steps help owners and operators avoid costly penalties for non-compliance while also protecting the Critical Cyber Assets that control or affect the reliability of North America's bulk electric power system.
Tags : 
tripwire, gene kim, nerc compliance, critical infrastructure protection, cip, cyber security standards, nerc-cip standard, information security, configuration control
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing
    
Tripwire
Published By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges, it management, platforms
    
IBM
Published By: DocuSign     Published Date: Mar 23, 2016
A recent survey of IT professionals by IDG Research shows that companies are struggling to keep their processes and documents in compliance with frequently changing ó and often conflicting ó regulatory standards.
Tags : 
    
DocuSign
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration, engineering disciplines, business objectives, change management, compliance standards, systems age, engineering process, information integration, communication, it management
    
IBM
Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi, security, network security
    
GFI
Published By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : 
netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing, systems monitoring, software development, it management
    
Netwrix
Published By: CA ITAM     Published Date: Sep 09, 2008
Learn more on how improving the efficiency of software inventory and license management processes can provide you with a host of benefits, including improved IT governance through stronger software compliance standards and processes, automated correlation of relevant software products within an organization’s infrastructure to their respective licenses, and reduced costs in the areas of license procurement, use rights and software purchases.
Tags : 
    
CA ITAM
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: NeoSpire Managed Hosting     Published Date: Oct 22, 2009
With the massive amount of information on an ever-evolving subject, understanding and becoming PCI compliant can be a daunting task. The process of becoming PCI compliant following the PCI SSC recommended process involves over 160 steps to a merchant's security system and can easily be misinterpreted. NeoSpire presents the Top 10 Misconceptions about PCI.
Tags : 
pci, neospire, security, compliance, paypal, data security standards
    
NeoSpire Managed Hosting
Start   Previous    1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.