compliant

Results 126 - 150 of 183Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM
Published By: Seagate Technology     Published Date: May 15, 2015
This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.
Tags : 
multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
Seagate Technology
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security
    
VeriSign Incorp.
Published By: SAS     Published Date: Aug 28, 2018
You may know some basics about data management, but do you realize the transformational results data-management-done-right can produce? This paper explains core data management capabilities, then describes how a solid data management foundation can help you get more out of your data. From getting fast, easy access to trustworthy data to making better decisions and becoming a data-driven business, you’ll learn why good data management is essential to success. Multiple real-world examples illustrate how SAS customers have used data management to improve customer experience, boost revenue, remain compliant and become more efficient.
Tags : 
    
SAS
Published By: Online Tech     Published Date: Aug 16, 2012
This white paper explores the impact of HITECH and HIPAA on data centers.
Tags : 
online tech, hippa, hitech, business associate agreement, healthcare
    
Online Tech
Published By: Online Tech     Published Date: Aug 16, 2012
This white paper explores the impact of the PCI DSS standard on data centers and server infrastructure.
Tags : 
online tech, pci, dss, ecommerce
    
Online Tech
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. This rule significantly expands the definition of fiduciary, spanning financial advisors as well as plan sponsors, funds, and producers who provide incentives to advisors. The rule has far-reaching impacts on business, compliance, and operations/technology and the April 2017 compliance deadline is coming up quickly. View this on-demand webinar and learn how DocuSign can help you: • Satisfy the final rule requirements by automating disclosures with a tamper-proof audit trail • Delight clients and brokers by providing a greatly improved customer experience • Meet critical DOL deadlines with rapid implementation "
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
"With every eSignature vendor claiming they are “eiDAS compliant”, you should equip yourself with the right level of knowledge to filter through what is right for your business. Download the whitepaper to learn why it is important choose an eSignature service provider that: • Delivers all the various e-signature types defined by eIDAS: Simple, Advanced and Qualified • Is independently accredited against European Commission-recommended technical standards • Offers international reach and experience to accommodate your business"
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. Many firms are in the early stages of assessing the rule’s impact, sorting through legal interpretations, and preparing for regulatory compliance. To understand who’s affected, what’s changed, and the impact to your business, read the white paper to learn how DocuSign can help you digitize your document agreements and: • Satisfy compliance requirements by enabling you to automate disclosures with a tamper-proof audit trail. • Delight your customers by providing a greatly improved user experience compared to paper-based document transactions. • Meet critical deadlines with rapid implementation using DocuSign’s SaaS-based solution."
Tags : 
    
DocuSign
Published By: VMware AirWatch     Published Date: May 18, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
application management, best practices, mobile support, mobile, systems management, business optimization, network management, application security
    
VMware AirWatch
Published By: VMware     Published Date: Dec 15, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch® support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, VMware AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
    
VMware
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
As employers, government agencies face a unique set of challenges. Fierce competition to find, keep, and develop the best talent, along with an increasingly intense level of scrutiny is placing human capital front and center. Not having enough staff, not having them properly trained, or having a noncompliant workplace can trigger a public crisis.
Tags : 
management, talent, organizations, communication
    
Cornerstone OnDemand
Published By: IntelliCorp     Published Date: Feb 12, 2015
Learn the basics of how to create a comprehensive and compliant background screening program that can help your organization reduce risk and promote a safe work environment.
Tags : 
background checks, background screening, employment background check, employment verification, criminal background check, education verification, drug testing, employment screening
    
IntelliCorp
Published By: Nativeflow     Published Date: Feb 25, 2014
Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.
Tags : 
office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management
    
Nativeflow
Published By: Nativeflow     Published Date: Feb 25, 2014
Is your company’s intranet portal available to employees on the go? Do employees need mobile access to your back-office systems while ensuring data on mobile devices is secure? Do users want to use their own mobile devices to access corporate data and applications? Download the datasheet to get in depth approaches to addressing these challenges.
Tags : 
intranet portal, on the go, mobile access, back-office systems, secure, ensure data, mobile devices, datasheet
    
Nativeflow
Published By: OpenText     Published Date: Aug 19, 2014
While perhaps not the most exciting way to exchange information, faxing is one of the most widely used, secure and compliant ways. This paper explains a solution that allows your organization to take full advantage of all of the benefits of faxing, while eliminating the associated costs such as lost productivity, overhead and lost business.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, security, knowledge management
    
OpenText
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management
    
OpenText
Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing
    
UnsubCentral
Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance
    
Secure Computing
Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security, compliance
    
Cenzic
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.