RSS feed Get our RSS feed

News by Topic

data compliance

Results 276 - 300 of 495Sort Results By: Published Date | Title | Company Name
By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection
     Secure Computing
By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
     Secure Computing
By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
     Secure Computing
By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : remote, remote access, remote network, network management, network security, data center, datacenter, data center management
     Axeda Corporation
By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : remote, remote access, remote network, network management, network security, hipaa, hippa, sox
     Axeda Corporation
By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft
     netForensics
By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance
     netForensics
By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
     netForensics
By: DocuLex     Published Date: Jan 01, 2001
Simply the most cost efficient option for securing your organizations email awaiting data discovery and fulfilling regulatory compliance.
Tags : storage management, compliance, retention management, electronic discovery, regulatory compliance, retention
     DocuLex
By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
     YouSendIt
By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
     YouSendIt
By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
     YouSendIt, Inc.
By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
     YouSendIt, Inc.
By: Intuit, Inc     Published Date: Jun 16, 2009
Nearly every business person regardless of their role – be it marketer, salesperson, consultant, engineer, or business owner – has acquired a second responsibility: project manager. In their desire to move quickly and keep costs low, many of these business people turn to the ubiquitous spreadsheet for help. Using a spreadsheet to track, update, and consolidate project information means spending valuable time on project administration – sending, receiving, and finding e-mails; cutting, pasting, consolidating, and reporting information; and reformatting, saving, and e-mailing spreadsheets.
Tags : intuit, quickbase, project management, available, familiar, inexpensive, immediate, spreadsheets
     Intuit, Inc
By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware
     NeoSpire Managed Hosting
By: IBM Software     Published Date: Aug 04, 2010
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information.
Tags : ibm ouncelab, data protection, c-level executive us, compliance, roi, performance, privacy, data security
     IBM Software
By: IBM Software     Published Date: Aug 09, 2010
The following are what we believe to be the top findings in this study. We organized these findings according to five major themes that emerged: perceived threats to sensitive and confidential information, responsibility and accountability, impact on the organization, perceived value of a data protection program, and perception gaps between CEOs and other C-level executives.
Tags : ibm ouncelab, data protection, c-level executive uk, compliance, roi, performance, privacy, data security
     IBM Software
By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 25, 2012
Read this whitepaper to learn the six steps you need to think different about endpoint security.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 25, 2012
This white paper presents five very effective ways to improve data security in a cost-effective manner.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: Lumension     Published Date: Jan 18, 2013
HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?
Tags : hipaaa, hitech act, compliance, cyber liability, healthcare data, data compliance
     Lumension
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics