Compliance Software Research
-
The Ten Best Practices for Secure Software Development
Sponsored by: ISC2Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software.
-
Validation Process and Compliance Support with IBM Maximo Asset Management in Regulated Industries
Sponsored by: IBMWhile there is no single method to guarantee software compliance, IBM Maximo® Asset Management can provide e-signature and e-record (audit trail) capabilities that support efforts to comply with regulations and guidelines related to e-records and e-signatures.
-
Case Study: Compliant and In Control: Sysmex America Tackles J-SOX with Security Weaver
Sponsored by: Security WeaverIn January 2008 Sysmex America deployed SAP for financial processes. While SAP access lets employees streamline workflow, it also created a potential SOD problem. Learn how Security Weaver has allowed better control of user access to its financial system, clearer role definitions, and a clear, accurate data trail suitable for any possible audit.
-
E-Guide A Decision Maker’s Guide to Log Management
Sponsored by: ArcSight, an HP CompanyWhile often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
-
SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation
Sponsored by: BWiseThis E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization.
-
E-Book: NERC Compliance
Sponsored by: TechTarget SecuritySearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
-
E-Book: Red Flag Rules Compliance
Sponsored by: GemaltoSearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
-
Case Study: WebEx - Securing Web Collaboration
Sponsored by: QualysRead this case study to learn about the vulnerability and compliance risk management program WebEx has implemented to ensure security and confidentiality among their customers.
-
PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
Sponsored by: IBMHigh transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
-
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
Sponsored by: TechTarget SecurityRead this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
-
Guide: Enterprise Security Reporter
Sponsored by: ScriptLogic CorporationIn large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
-
The New Age of Compliance: Preparing Your Organization for a New Era of Increased Accountability and Enforcement
Sponsored by: Mimosa SystemsThis white paper examines the current state of regulatory compliance and the impact of non-compliance. It also addresses the current political environment and the shift in the compliance landscape and compliance enforcement for which organizations need to be prepared. Finally, it discusses some best practices that can be applied to streamline..
-
Control Compliance Suite Trialware
Sponsored by: Symantec CorporationControl Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
-
Laws, regulations and compliance: Top tips for keeping your data under your Control
Sponsored by: Sophos UKThe challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
-
Profiting from PCI Compliance
Sponsored by: IBMThis paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
-
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: TechTarget SecurityThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: TechTarget SecurityThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
Sponsored by: TechTarget SecurityThis expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
-
Symantec IT Compliance Solution
Sponsored by: Symantec CorporationSymantec helps organizations reduce compliance costs by automating key IT compliance processes, including policy management, controls assessment, monitoring, remediation, and reporting. Check out this brochure to learn more.
-
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
Sponsored by: IBMCheck out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
-
Enabling Sustainable Compliance Management
Sponsored by: IBMRead this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
-
Achieving Compliance in a Virtualized Environment
Sponsored by: Tripwire, Inc.The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
-
Hedge Funds: Why Comply? - A Practical Guide to Developing a Culture of Compliance
Sponsored by: Advent Software, IncThis white paper written by Advent Software outlines how hedge funds can create a "culture of compliance" with best practice ideas for accurate record keeping and reporting, transparency in operations and, putting the interests of investors first.
-
Meeting the Payment Card Industry Data Security Standard
Sponsored by: Prism Microsystems Inc.Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues.
-
Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
Sponsored by: XTSThis white paper provides an analytical perspective on how to best manage your Citrix environment.