comply

Results 126 - 150 of 169Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 16, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on-premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : ibm, encryption, hybrid-cloud, data protection
     IBM
By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : gdpr, ibm, compliance, ibm security
     Group M_IBM Q1'18
By: IBM     Published Date: Apr 13, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : gdpr, compliance, data protection, personal data
     IBM
By: SAS     Published Date: Aug 28, 2018
Some organizations focus on the scary aspects of failing to comply with the EU General Data Protection Regulation. But there are many long-term benefits of following through with plans for sustainable GDPR compliance – such as gaining a competitive edge, or developing new products or services. To learn how organizations have approached compliance efforts, SAS conducted a global survey among 183 cross-industry businesspeople involved with GDPR. Based on the results, this e-book delves into the biggest opportunities and challenges faced. Read the e-book to: • Get advice from industry experts. • Find out what steps peers have taken. • Learn how an integrated approach from SAS can continue to guide your journey.
Tags : 
     SAS
By: HP Enterprise Services     Published Date: Mar 24, 2014
HP created and implemented a disaster recovery plan for BAT Italia, across data and desktop, to comply with the Group’s global standards. Read how the HP approach consolidated the existing server infrastructure and planned a new disaster recovery site. And ongoing, flexible support provides a quarterly review of processes and application and hardware refreshes, thus ensuring business continuity, for the first time, across the entire business.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, data center
     HP Enterprise Services
By: BlueHornet     Published Date: Jun 06, 2008
Applying opt-in email marketing strategies and best practices to transactional emails can be a win-win for customers and marketers. But the two types of communications are not the same. This white paper is written to help email marketers and online retailers understand: What sets transactional emails apart from commercial messages; how they must comply with all federal regulations; and where to take advantage of opportunities to optimize their transactional email program.
Tags : email marketing, email messaging, blue hornet, bluehornet
     BlueHornet
By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : web security, web threats, ssl, secure sockets layer, technology, solution, security
     GeoTrust
By: GeoTrust     Published Date: Oct 06, 2014
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : cloud provider, cloud computing, economic benefits, safeguard information assets, ssl, confidence
     GeoTrust
By: CBIZ     Published Date: May 05, 2014
Employers can use this clear and concise guide to understand what action steps they need to take (and when) in order to comply with the various requirements of the Affordable Care Act.
Tags : employer health reform, affordable care act, cbiz, plan design requirements, reporting requirements, plan sponsors
     CBIZ
By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules
     ActiveProspect, Inc.
By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules
     ActiveProspect, Inc.
By: AlienVault     Published Date: Mar 30, 2016
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
     AlienVault
By: PKWARE     Published Date: Aug 21, 2009
Any organization that stores or transfers health or insurance records electronically must comply with HIPAA, from health care facilities to HR departments. PKWARE offers straightforward strategies for managing protected health information.
Tags : compliance, hipaa compliance, hipaa, healthcare, privacy, health, health information management, him
     PKWARE
By: PKWARE     Published Date: Aug 21, 2009
Regulatory and business requirements are driving the need for protecting information stored and transferred electronically. PKWARE provides an introduction to protecting your most valuable asset - your data.
Tags : regulatory compliance, compliance, information management, data security, data protection, secure content management, pki, pkware
     PKWARE
By: PTC     Published Date: Aug 21, 2009
Download this report on how to implement a successful environmental compliance strategy for the long term. Learn about new strategies for complying with upcoming environmental regulations, as well as the compliance shortcomings common to many companies in a new research report by AberdeenGroup.
Tags : compliance, environmentalism, epa, manufacturing, responsibility, consumer electronics, ptc
     PTC
By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips
     Third Brigade
By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management
     NetIQ Corporation
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn about the key challenges of PCI DSS v1.1 and how NetIQ Security Management, Configuration Control and Enterprise Administration solutions can help you demonstrate PCI compliance.
Tags : pci, pci dss, compliance, credit card, payment card, pci compliance, customer privacy, privacy
     NetIQ Corporation
By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance
     NetIQ Corporation
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : identity theft, application security, password management, security management, compliance, california sb 1386, senate bill 1386, ab 1950
     Cenzic
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance
     Cenzic
By: Blue Lane     Published Date: Aug 31, 2007
Needing to implement a patch management solution to comply with SAS 70, Davidson found the solutions on the market lacking. They either required significant resources to test all patches, or were expensive automated solutions. Then, Davidson learned about Blue Lane Technologies, a concept that Davidson loved.
Tags : server virtualization, server security, network security, patch management, sas70, sas 70, compliance, sox compliance
     Blue Lane
By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management
     Ecora Software
Start   Previous    1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com