RSS feed Get our RSS feed

News by Topic

compliance vulnerabilities

Results 1 - 19 of 19Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
     McAfee
By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
     McAfee
By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley
     McAfee
By: McAfee     Published Date: Mar 11, 2013
McAfeeģ Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
     McAfee
By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : pci dss, ibm, mmdg, payment card industry, assessment, design, deployment, management
     IBM
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security
     Alert Logic and Sungard Availability Services
By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but weíll help you get started in four easy steps.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your companyís applications arenít at risk!
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
     Black Duck Software
By: AWS     Published Date: Jun 03, 2019
Background As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networksí security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
     AWS
By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
     Tripwire
By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
     Tripwire
By: IBM     Published Date: Jan 09, 2017
Learn about the security and compliance vulnerabilities of governing identities and segregating access with the concept of roles, and discover how governing at the entitlement level can improve access control. Discover how to automate controls and reporting, and manage orphan accounts to ensure that former users donít retain access after they leave the organization. IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : ibm, security, identity governance and intelligence, identity governance, entitlements, compliance
     IBM
By: NAVEX Global     Published Date: Dec 22, 2017
Assessment is part of your compliance programmeís necessary life cycle for improvement. We work in an ever-evolving landscape of risk that requires compliance professionals to identify the gaps their programmes have today, and may have tomorrow. Your programme effectiveness as a whole is based on the effectiveness of each one of its parts. So, ensure your assessment is broad as well as in-depth. Programme assessment is not a tick-the-box exercise. It is just as important as creating a company culture and mitigating risk. Remember, if your assessment is thorough and effective, you will have identified weaknesses in your programme and vulnerabilities for risk. Donít be discouraged by your work to highlight these areas for improvement. Your programme and your organisation will be better for it once you make the necessary adjustments for a robust and effective ethics and compliance programme.
Tags : compliance programme, compliance, programme assessment, definitive guide, improving compliance, ethics and compliance, programme awareness, anti-bribery awareness
     NAVEX Global
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management
     NetIQ Corporation
By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies
     Cisco
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate Ė a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizationís DevOps practice, Tenable encourages you to read the Gartner report, ď10 Things to Get Right for Successful DevSecOps.Ē Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and misconĀgurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics