Compliance Audits Research
-
Information Security Magazine, May 2009: Automating Compliance
Sponsored by: Information Security MagazineThis month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
-
Governance, Risk, Compliance: Policy Management - Methods and tools
Sponsored by: TechTarget SecurityThis E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.
-
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
-
Automated Compliance: Making the Case and Reaping the Rewards
Sponsored by: Tripwire, Inc.Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
-
Addressing Compliance Initiatives with Center for Internet Security Benchmarks
Sponsored by: Tripwire, Inc.This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
-
Laws, regulations and compliance: Top tips for keeping your data under your Control
Sponsored by: Sophos UKThe challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
-
Profiting from PCI Compliance
Sponsored by: IBMThis paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
-
Enabling Sustainable Compliance Management
Sponsored by: IBMRead this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
-
Achieving Compliance in a Virtualized Environment
Sponsored by: Tripwire, Inc.The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
-
Compliant Statement Archiving and Presentment for Financial Services
Sponsored by: EMC CorporationRead this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements.
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
LogRhythm and NERC CIP Compliance
Sponsored by: LogRhythm, Inc.LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements.
-
The "Hard Truths" About Managing Administrative and Application Identities
Sponsored by: CyberArk Software, IncThis videocast will examine the "hard truths" around managing administrative and application identities and suggest a practical approach to include privileged identity management in your overall governance, risk management and compliance strategy.
-
Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications
Sponsored by: Paymetric, Inc.Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information.
-
The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
Sponsored by: ImpervaRead this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.
-
A Pathway to PCI Compliance
Sponsored by: ImprivataThis white paper examines the requirements of the PCI DSS and discusses the identity and access management technologies available to help your organization comply with these regulations in an efficient and cost-effective manner.
-
Online Demo - Vulnerability Management & Policy Compliance Overview
Sponsored by: Qualys, Inc.Take a multimedia tour of QualysGuard, the Web-based Vulnerability Management and Policy Compliance solution that pinpoints network vulnerabilities before hackers have a chance to exploit them.
-
Turning RegNMS and MiFID Challenges into Opportunities
Sponsored by: Infosys Technologies LimitedRegNMS and MiFID aim to protect investors by ensuring best price on every execution. Read this paper to learn about solutions that will help organizations capitalize on RegNMS and MiFID compliance.
-
Project Workforce Management for Service Organizations
Sponsored by: TenroxProfessional services automation is not flexible enough to overcome the challenges associated with delivering services. Read this paper to learn how project workforce management can improve collaboration between your organization and its customers.
-
Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
Sponsored by: VeriSign, IncThe drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
-
AppDetective
Sponsored by: Application Security, Inc.Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
-
Teamstudio Build Manager
Sponsored by: Teamstudio, Inc.Teamstudio has developed Build Manager, a flexible and sophisticated build tool that helps automate your application build process, providing you with error-free builds, internal control and audit compliance.