RSS feed Get our RSS feed

News by Topic

compliance mandates

Results 26 - 34 of 34Sort Results By: Published Date | Title | Company Name
By: Xiotech     Published Date: Mar 01, 2007
Many organizations have no policies in place for retaining, managing, and purging documents. This paper looks at some of the basic components of a document strategy—retention, management, and destruction—and highlights some of the current compliance drivers that make it all necessary.
Tags : archive management, email archiving, email archive, data warehousing, compliance, data retention, xiotech
     Xiotech
By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance
     Ecora Software
By: OneNeck IT Services     Published Date: May 30, 2018
Use a proven framework now, protect your data and meet compliance mandates tomorrow.
Tags : 
     OneNeck IT Services
By: OneNeck IT Services     Published Date: May 30, 2018
Use a proven framework now, protect your data and meet compliance mandates tomorrow.
Tags : 
     OneNeck IT Services
By: Sage     Published Date: Jul 30, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : sage, compliance, workforce, fines, reporting, mandates
     Sage
By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: IBM     Published Date: Jun 08, 2017
The healthcare payer ecosystem in the United States has changed dramatically over the last decade and is expected to evolve at an even faster pace over the next few years. Many world-class companies involved in healthcare payment processing are finding themselves constrained by their existing information technology infrastructure. The silos that they built around business-to-business (B2B) processing are constraining them, making it difficult to achieve governmental mandates and (more importantly) increase processing efficiency and competitive advantage. Gone are the days of a small set of data following static and simple standards traded between a limited set of organizations. Gone are the days where the rules for when data is valid versus invalid can expressed in a paragraph or two. Gone are the days when information about a healthcare payment was almost entirely about the "who," "when," and "how much."
Tags : hipaa, healthcare, b2b, organizational strategy, affordable care
     IBM
By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics