Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

risk and compliance

Results 1 - 25 of 176Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Jan 02, 2013
The growing use of tablets, smartphones, and ultrabooks makes enpoint governance, risk management, and compliance (GRC) more challenging.
Tags : 
absolute software, grc strategy, adjust your endpoint, enpoint governance, security
    
Absolute Software
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data, it management, enterprise applications
    
Aternity
Published By: Avalara     Published Date: Jan 28, 2014
Sales tax compliance and the CFO: What automation means for risk management conveys why it’s time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance — and, more importantly — what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices
    
Avalara
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
    
Aveksa
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management, datacenter management, axeda, high availability, spend management, security, remote network management, vpn
    
Axeda Corporation
Published By: Blue Coat     Published Date: Mar 11, 2016
The cloud creates new risks and compliance issues for organizations already struggling with traditional threats. Get Blue Coat’s new E-Book, “Securing Cloud Applications & Services.”
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, infrastructure
    
Blue Coat
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure
    
Blue Coat Systems
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending
    
Brainloop
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : 
brainloop, technology, security, it security, end users
    
Brainloop
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance
    
Brainloop
Published By: Brainshark     Published Date: May 07, 2013
Do your field reps use iPads or iPhones? If so, enable them to present with PowerPoint the way it was meant to be seen -- with fonts, colors and animations intact. Plus, empower you content team to instantly edit and update all versions of a particular presentation, all with the click of a mouse. Ideal for reducing risk and maintaining compliance! Users in more than 140 countries use SlideShark to deliver consistent, secure PowerPoint presentations on iPads and iPhones. Find out how SlideShark can empower you to distribute, control and track field PowerPoints. Click here to watch a quick 2-minute video and see SlideShark in action.
Tags : 
powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
    
Brainshark
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
    
CA Technologies
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Gain control of your organization’s records, proactively maintain regulatory compliance and, most importantly, protect your firm from legal risk and exposure by reading an important whitepaper on best practices for administering a successful program.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic records, electronic records management, document imaging, document imaging services, document management, document management services, business management, business imaging, business performance, document workflows, business outsourcing, enterprise applications
    
Canon Business Process Services
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability, it management
    
Centrify Corporation
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption, compliance, data encryption, data protection, regulation compliance, efficiency
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Securely store and share your firm's and your clients' tax information data. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.