The Role of Security Management in Achieving "Continuous Compliance"
sponsored by CA Technologies.

There's a tremendous focus today on regulatory compliance involving financial reporting, security and data privacy. But there are also tremendous business performance opportunities that can be fueled by the new requirements. Achieving compliance alone is simply meeting the requirements of the law. But improving business performance, in the context of compliance, involves using the process and technology changes brought on by compliance to help increase the efficiency of the business itself. This is where the real benefits of compliance are achieved.

Taking full advantage of the opportunity requires an environment that allows continuous compliance an integrated approach that helps permanently improve compliance processes and practices beyond individual projects or efforts. This requires compliance to be cost-effective, with appropriate controls, proof of controls, and the ability to securely manage public-facing assets, such as web-based business applications. This requires a strong security infrastructure that protects systems, applications, data and processes from unauthorized use or access. Companies that commit themselves to developing an integrated security management infrastructure for continuous compliance will initially focus on four critical capabilities: Identity Administration, Provisioning, Access Management, and Monitoring and Auditing.

This paper details the benefits of continuous compliance, which include reduction of risk and cost and an increase of efficiency and business agility.

Available Resources from CA Technologies.
See what other users are reading via our Daily Top 50 Report

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement