Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FFIEC Compliance

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Conformance to a set of standards for online banking issued in October 2005 by the Federal Financial Institutions Examination Council (FFIEC). The standards require multifactor authentication (MFA) because single-factor authentication (SFA) has proven inadequate against the tactics of increasingly sophisticated hackers, particularly on the Internet.
FFIEC Compliance Reports
1 - 25 of 813 Matches Previous Page  |  Next Page
5 Cornerstones of Compliance
sponsored by Datto, Inc.
WHITE PAPER: This resource highlights the 5 cornerstones of security compliance, and gives you the facts on a security strategy designed to meet a diverse set of MSP needs.
Posted: 16 May 2014 | Published: 31 Dec 2013

Datto, Inc.

5 Steps to Effective Log Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper is an excellent resource for IT security executives, providing 5 steps that enterprises should take in designing a more effective log management strategy.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Dell SecureWorks

5 Toxic QSA Stereotypes
sponsored by Dell SecureWorks
WHITE PAPER: This white paper details the different types of problems that organizations often face with their QSAs in the course of achieving PCI compliance. Learn how to recognize common problems before you hire a QSA who doesn't have your business' best interest in mind.
Posted: 09 May 2011 | Published: 04 May 2011

Dell SecureWorks

6 Benefits of Unified Communications as a Service
sponsored by XO Communications
WHITE PAPER: Read this white paper to learn about a hosted Unified Communications as a Service (UCaaS) offering that lets you focus on your core business. Listed are six benefits of a UCaaS hosted solution.
Posted: 27 May 2015 | Published: 27 May 2015

XO Communications

6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

8 Best Practices for Securing Enterprise Data Sources and Achieving Compliance
sponsored by IBM
WHITE PAPER: This informative white paper explains why organizations need to adopt a more proactive, systematic approach to securing sensitive data and addressing compliance requirements amid the digital information explosion.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

A clearer horizon. Do CIOs have more clarity about cloud computing?
sponsored by ComputerWeekly.com
IT BRIEFING: This research from management consultants, Xantus, shows that while there is still a lack of clarity and a reluctance to fully commit to the cloud, there is a general acceptance from CIOs of the benefits and a growing commitment to develop those benefits.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ComputerWeekly.com

A More Effective Approach to Scalable Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper can help you easily focus your security on your most sensitive data by providing guidelines to effective data classification.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Digital Guardian

"Linc-ing" the Enterprise: Web Conferencing Completes the Puzzle
sponsored by iLinc Communications
ANALYST REPORT: In this White Paper, Frost & Sullivan has reviewed the enterprise web conferencing deployment options of iLinc, their strengths and weaknesses and how iLinc meets communication needs present in today's environment.
Posted: 05 Apr 2004 | Published: 01 Jan 2004

iLinc Communications

10 Reasons Your Existing Security Information and Event Management Isn't Good Enough
sponsored by eIQnetworks
WHITE PAPER: "Are we secure? Is our data protected?" Enterprises have turned to security information and event management (SIEM) solutions to answer these questions and address forensics or security operations issues. For the most part, SIEMs have failed to do what they promised. Read this paper to see what the problems are, and what solutions are available.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

eIQnetworks

10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis
sponsored by Techrigy
WHITE PAPER: Risks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.
Posted: 08 Oct 2007 | Published: 01 Sep 2007

Techrigy

15 Minutes to Complete Data Protection
sponsored by CipherOptics
WHITE PAPER: Increasingly, data is the most important asset a company owns. Protecting this data used to mean costly configurations that resulted in increased latency and network speed. This paper examines ways to protect this valuable data in just 15 minutes.
Posted: 13 Mar 2006 | Published: 31 Dec 2005

CipherOptics

2006 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
Posted: 28 Dec 2007 | Published: 01 Oct 2006

ISC2

2008 ERP in the Mid-Market
sponsored by Sage North America
WHITE PAPER: This report explores feedback from over 500 mid-size companies, and aims to serve as a roadmap to those that desire to reduce costs, and improving accuracy and delivery performance.
Posted: 13 Jan 2009 | Published: 13 Jan 2009

Sage North America

5 Keys to Developing an Awareness Program
sponsored by Polivec
WHITE PAPER: Whether your focus is on Human Resources, IT security, regulatory compliance or just following best practices, achieving compliance begins with a quality employee awareness program.
Posted: 25 Apr 2008 | Published: 01 Jan 2007

Polivec

5 Steps to Automating Accounts Payable
sponsored by Kofax, Inc.
WHITE PAPER: This white paper proposes a 5-step approach to automate an accounts payable operation, describing the typical costs of processing invoices manually and the saving that can be achieved with each of the incremental steps.
Posted: 03 Feb 2009 | Published: 03 Feb 2009

Kofax, Inc.

6 Best Practices for Preventing Enterprise Data Loss
sponsored by RSA
WHITE PAPER: Nearly 220 million electronic records have been breached since January 2005, according to Privacy Rights Clearinghouse. This paper outlines six best practices for corporations seeking to prevent enterprise data loss in order to protect revenue, limit customer attrition, and meet government regulatory requirements.
Posted: 05 Feb 2009 | Published: 05 Feb 2009

RSA

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER: This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Qualys

7 Reasons Businesses are Shifting to Cloud Backup
sponsored by CoreVault
WHITE PAPER: Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

CoreVault

8 Problems of Keyword Search in E-Discovery - A Guide for Fortune 1000 Companies
sponsored by FTI Technology
WHITE PAPER: With data collections growing at an epic pace, legal teams must sift quickly through documents and e-mail at rates that would have seemed unrealistic just 5 years ago. Simply put, keyword search strategies break when thrown against the mountains of data which define today’s legal matters.
Posted: 18 Dec 2009 | Published: 18 Dec 2009

FTI Technology

A Better Approach to Managing File System Data
sponsored by EMC Corporation
WHITE PAPER: File system data is growing at a staggering rate, putting pressure on data access, storage and legal requirements. This white paper explores these challenges and presents a solution for managing growing file system data.
Posted: 01 May 2006 | Published: 03 Aug 2005

EMC Corporation

A Decision Maker’s Guide to GRC Solutions
sponsored by McAfee, Inc.
EZINE: It’s been almost a decade since the Sarbanes-Oxley Act changed the governance, risk and compliance (GRC) landscape, but companies continue to grapple with putting together clean solutions that address their needs. Access this resource for a comprehensive checklist of features to look for when selecting a GRC vendor.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

McAfee, Inc.

A Guide to Email Regulatory Compliance
sponsored by USA.NET, Inc.
WHITE PAPER: This guide will list and review several regulations and privacy laws that apply to all businesses in order to protect private or sensitive information, discuss different approaches to email security, and give a rundown of several security solution services for your business hosted by USA.NET.
Posted: 23 Jul 2009 | Published: 23 Jul 2009

USA.NET, Inc.

A Guide to Understanding Messaging Archiving
sponsored by Sunbelt Software
WHITE PAPER: This analyst paper by Osterman Research discusses the several reasons to implement a messaging archiving system and provide an overview of ten vendors whose offerings are focused squarely on the archiving space.
Posted: 15 Feb 2008 | Published: 06 Aug 2008

Sunbelt Software
1 - 25 of 813 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement