compliance with regulations

Results 1 - 25 of 43Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : mobility, mobile computing, best practices, data security
     Absolute Software
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
     Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
     Alert Logic and Sungard Availability Services
By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Comply with regulations like FCPA - Eliminate fraud and waste
Tags : 
     AppZen
By: AppZen     Published Date: Oct 21, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Comply with regulations like FCPA - Eliminate fraud and waste
Tags : 
     AppZen
By: Avetta     Published Date: Sep 17, 2019
On January 23, 2019, OSHA put into effect its 2019 Annual Adjustment that raised the penalties of violation by approximately 2.5% over the 2015 revised amounts. The consequences of non-compliance with OSHA regulations extend beyond the financial penalties imposed by the regulatory authority, with the biggest risk that an organization runs is that of reputational damage. In this whitepaper you’ll learn: • The most cited occupational hazards over the last year • How to be proactive in preventing occupational hazards in your workplace • The importance of pre-qualifying third party contractors in order to mitigate risk in your organization
Tags : 
     Avetta
By: BMC ESM     Published Date: Aug 19, 2009
The paper discusses the agility enabled by virtualization, the resulting control challenges, and a way to meet those challenges. It describes seven major requirements for success and reviews how the BMC/VMware approach helps IT ensure control over the virtualized data center and maintain compliance with corporate policies and government regulations.
Tags : bmc software, virtualization, vmware, virtualized data center, networking, storage
     BMC ESM
By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
By: Citrix ShareFile     Published Date: Feb 06, 2017
Do you know why data encryption is important for your business? Find out how using advanced encryption lets you: - Protect your data and reputation while meeting clients’ expectations. - Support your compliance with industry regulations and ethical obligations. - Eliminate paperwork and other overhead associated with data storage and sharing.
Tags : networking, security, enterprise applications
     Citrix ShareFile
By: Comcast Business     Published Date: Jul 10, 2017
The financial services industry is increasingly at a crossroads. Faced with mounting pressure from external forces, such a competition from FinTech companies and a more demanding client base, banks and financial services firms are working to become more customer-centric in their approach to business. However, the need to keep sensitive customer and business information secure and ensure compliance with government regulations can stymie those efforts. The proprietary hardware so prevalent in traditional networks can’t provide what financial institutions need; a growing number, therefore, are turning to software-defined networking (SDN).
Tags : financial services, sdn, increase efficiency, reducing complexity, next-generation technologies, financial benefits, security control, lower costs
     Comcast Business
By: Concur ENT     Published Date: May 11, 2018
VAT has been a valuable source of revenue for the UK Government since 1973. Yet, despite more than 40 years of getting used to calculating, paying and reclaiming VAT, businesses still struggle to adhere to HMRC guidelines. With support from SAP Concur, it doesn’t have to be this way. First, we offer an expense audit solution to check for fraud and non-compliance. Secondly, we work with tax specialists to help you comply with VAT regulations. Thirdly, we give you visibility and control over all aspects of your travel, expense and invoice spending. Crucially, we see VAT reclaim as an opportunity to reduce business costs and put money back in your budget.
Tags : 
     Concur ENT
By: Dassault Systèmes     Published Date: Sep 22, 2017
The view ahead for the aerospace and defense industry shows us growth and change. Air traffic has been following a pattern of steady increase that calls for larger aircraft fleets. At the same time, OEMs and suppliers are under mounting pressure to simplify processes, reduce costs and move products to market more quickly – while remaining in compliance with changing environmental regulations. Download this white paper to find out how the unique capabilities of DELMIA make it possible to manage change along the value stream, from engineering design to shop-floor work instructions.
Tags : aerospace, aviation, manufacturing, product development, plm, product lifecycle management, automation, data
     Dassault Systèmes
By: Delphix     Published Date: Jun 27, 2014
Making your IT organization more elastic and efficient is hard. Doing it while staying in compliance with regulations is even harder. Download this white paper to learn how your IT organization can accelerate business, introduce new services, and reach new markets, all while staying in compliance.
Tags : mitigation, time to value, regulations, organization, new markets, compliance, networking, it management
     Delphix
By: Delphix     Published Date: Mar 24, 2015
Poor data archiving can lead to non-compliance with regulations. This white paper outlines Delphix's Live Archive, which can build a condensed copy of a data source that can be accessed on demand and quickly while also bookmarking data sources to restore any application so one can comply with regulations.
Tags : 
     Delphix
By: IBM     Published Date: Jan 15, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations.
Tags : ibm, identity governance, compliance, risk control, security, enterprise applications
     IBM
By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : ibm, identity governance, risk control, risk management, data security, security, enterprise applications
     IBM
By: IBM     Published Date: Jul 22, 2016
You’ll learn: - About the mandates that will significantly increase transaction complexity and transaction volumes for payers and providers - How to reduce costs and improve processing efficiencies while also decreasing the risk associated with data movement - Ways to improve customer service and ensure compliance with evolving regulations while reducing IT operating expenses
Tags : ibm, healthcare, affordable care act, b2b, hipaa, edi regulations, enterprise applications
     IBM
By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : ibm, analytics, ecm, digital business, enterprise applications
     IBM
By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
     IBM
By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues
     iCIMS
By: Imprivata     Published Date: Dec 06, 2013
The vital information CIOs need to ensure that their text messaging is both secure and in compliance with the current regulations.
Tags : secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
     Imprivata
By: Interactive Intelligence     Published Date: Feb 28, 2013
In an effort to help receivables management companies achieve compliance with federal and state laws and regulations, Interactive Intelligence queried a group of ten ARM industry professionals about the future trajectory of compliance issues in 2012.
Tags : debt collection, compliance, 2012, interactive intelligence, debt collection compliance, arm, interactive intelligence, enterprise applications
     Interactive Intelligence
By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications
     Intralinks
By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
     Intralinks
By: Ipswitch     Published Date: Dec 01, 2014
You’ve seen it in the news. The fines levied against financial institutions for non-compliance with governmental regulations can be staggering. We’re no longer talking about millions of dollars—but billions of dollars. Needless to say, the stakes are high. And at no point in the life of your IT department has it ever been more important to ensure compliance with international, federal and state mandates. File transfers are a perfect case in point.
Tags : ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution
     Ipswitch
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com