Gramm-Leach-Bliley Act Research
Eagle Bank Keeps Deposits and Customer Data SafeSponsored by: Imprivata
This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
PowerBroker Password Safe: Security, Compliance, ProductivitySponsored by: BeyondTrust Corporation
Uncover how PowerBroker Password Safe can help you secure access to privileged accounts, effectively preventing intentional or accidental harm and malicious activity that can be devastating to your business.
E-Guide A Decision Maker’s Guide to Log ManagementSponsored by: ArcSight, an HP Company
While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
IDC White Paper: Effective Information SecuritySponsored by: CA (India) Technologies Pvt. Ltd
Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...
Achieving GLBA Compliance with Red Hat Enterprise Virtualization for DesktopsSponsored by: Red Hat and JBoss
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility.
PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance SolutionSponsored by: Tripwire, Inc.
What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
SOX, GLBA and HIPAA: Multiple Regulations, One Compliance SolutionSponsored by: Tripwire, Inc.
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
Profiting from PCI ComplianceSponsored by: IBM
This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
Critical Technologies for Compliance and Risk ManagementSponsored by: Siperian, Inc.
Due to the financial meltdown in the mortgage-backed securities industry, new compliance requirements will be implemented. Read this paper to find out how organizations can ensure compliance with stricter regulations and manage risk appropriately so the business does not slip into non-compliance resulting in negative publicity or punitive fines.
Laws, regulations and compliance: Top tips for keeping your data under your controlSponsored by: Sophos
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Get the Facts on Information Availability: Essential Data Protection, Recovery and Resiliency for BanksSponsored by: Vision Solutions
The power of an information availability solution lies in its ability to transform any nonproductive, non-profitable downtime into the optimum level of value-producing business uptime.
Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White PaperSponsored by: Symantec Corporation
This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Practical Guide to Understanding and Complying with the Gramm-Leach-Bliley ActSponsored by: Ecora Software
New whitepaper on GLBA - learn key steps for validating compliance with the Gramm-Leach-Bliley Act, the background of GLBA - what it is and who must adhere, and how senior management and IT departments must ensure that customer data is safeguarded.