Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FFIEC Compliance

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Conformance to a set of standards for online banking issued in October 2005 by the Federal Financial Institutions Examination Council (FFIEC). The standards require multifactor authentication (MFA) because single-factor authentication (SFA) has proven inadequate against the tactics of increasingly sophisticated hackers, particularly on the Internet.
FFIEC ComplianceReports
201 - 225 of 806 Matches Previous Page  | Next Page
Defining Your Corporate Mobile Policies
sponsored by SearchSecurity.com
EGUIDE: It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization
Posted: 22 Sep 2008 | Published: 18 Sep 2008

SearchSecurity.com

Detecting Security Breaches and APTs with Big Data Security Analytics
sponsored by LogRhythm, Inc.
WEBCAST: This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.
Posted: 04 Sep 2013 | Premiered: Dec 11, 2012

LogRhythm, Inc.

E-Book: Technical Guide on Web Application Firewalls
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

SearchSecurity.com

E-Discovery Case Law Update: What the Courts Expect of Your Search and Culling Efforts
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This expert classroom supplies the latest case law update exploring recent court decisions related to e-discovery. Users will gain essential insights around the impact of these cases and where Web 2.0 comes into play, along with tactics and strategies organizations should consider to help control their e-discovery costs and risks.
Posted: 27 Aug 2013 | Premiered: 27 Aug 2013

SearchCompliance.com

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Delivering Enterprise Value with Oracle Governance, Risk & Compliance
sponsored by Oracle Corporation
WHITE PAPER: In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Dell Software Inventory & Usage Management
sponsored by Dell, Inc. and Intel®
DATA SHEET: The Dell Software Inventory & Usage Management service automates software and hardware asset discovery and reporting, monitors software usage and helps simplify software license compliance helping managers to control IT costs, reduce software license compliance risks, and make informed decisions regarding software purchasing...
Posted: 07 Oct 2009 | Published: 07 Oct 2009

Dell, Inc. and Intel®

Demand More From Your Data Center Environment
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a colocation strategy that offers more than just space and power to help you optimize your data center operations, achieve compliant IT security, and more.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Demystifying Data De-Duplication: Choosing the Best Solution
sponsored by FalconStor Software
WHITE PAPER: This document provides the background information required to make an informed data de-duplication purchasing decision.
Posted: 12 Jun 2007 | Published: 01 Jun 2007

FalconStor Software

Demystifying Data Loss Prevention: Requirements for Comprehensive Protection
sponsored by DynTek Inc. and McAfee
WHITE PAPER: Learn how Data Loss Prevention technology provides unprecedented visibility intohow data is used, and by whom, why, and when. With this insight, you can define and enforce data usage policies that help prevent both accidental and malicious data loss.
Posted: 21 May 2008 | Published: 01 May 2008

DynTek Inc. and McAfee

DeveloperWorks Interview
sponsored by IBM Software Group
PODCAST: How can Governance not be seen as a hindrance - but as an enabler, and provide the freedom to operate without worrying about those issues. This podcast reviews governing development as the next step in development organization transformation.
Posted: 09 Apr 2007 | Premiered: Apr 9, 2007

IBM Software Group

Directory and Resource Administrator 7.5 Trial
sponsored by SUSE
TRIAL SOFTWARE: NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker
sponsored by i365, makers of Evault
WHITE PAPER: In this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

i365, makers of Evault

Disk-Based Backup & Recovery
sponsored by Datalink Corp
WEBCAST: Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are.
Posted: 03 Jan 2008 | Premiered: Jan 16, 2008, 12:30 EST (17:30 GMT)

Datalink Corp

Document Management: A Practical Guide for Accounting and IT in Midsized Organizations
sponsored by ACOM Solutions, Inc.
WHITE PAPER: This paper summarizes the challenges faced by Accounting and IT departments in midsize organizations, and presents a list of "must have" document management capabilities for each department.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

ACOM Solutions, Inc.

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Driving to Best Practices in Archiving
sponsored by Plasmon
WHITE PAPER: Archiving has become an imperative in today's legal, regulatory and IT-complex environments. But without a strategy in place, you can run into challenges. This white paper outlines archiving best practices to help you manage your critic...
Posted: 30 Apr 2007 | Published: 01 Mar 2007

Plasmon

Duet Beat Newsletter, March 2007
sponsored by Duet for Microsoft Office and SAP
NEWSLETTER: Duet provides key reporting and analytics capabilities, helping end-users access up-to-date enterprise information from mySAP applications from within the familiar Microsoft Office environment.
Posted: 23 Apr 2007 | Published: 01 Mar 2007

Duet for Microsoft Office and SAP

Duet Software Technical Overview: Bringing Together Business Productivity and Enterprise Applications
sponsored by Duet for Microsoft Office and SAP
WHITE PAPER: Duet creates tremendous value for both end users and IT organizations. Read this technical brief to discover the support scenarios, architecture overview, Duet software architecture advantages and hardware and software requirements.
Posted: 23 Apr 2007 | Published: 01 Apr 2007

Duet for Microsoft Office and SAP

e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff
sponsored by Symantec Corporation
BOOK: This e-book provides expert information on how to bridge the gap between IT management, security staff, and legal terminology.
Posted: 27 May 2008 | Published: 26 May 2008

Symantec Corporation

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
sponsored by Symantec Corporation
BOOK: This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
Posted: 01 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

E-Book: IT in the Electronic Hospital
sponsored by Imprivata
EBOOK: The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.
Posted: 11 Feb 2010 | Published: 11 Feb 2010

Imprivata

E-Book: Log Management for Compliance
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

SearchSecurity.com & SearchCompliance.com

E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

SearchSecurity.com

E-Book: Smart Virtualization Decisions
sponsored by Dell, Inc. and Intel®
EBOOK: This e-book provides a roadmap to virtualization success for CIOs and strategic IT. Topics include: how to align virtualization with business priorities, virtualization beyond the server has its rewards, maintaining compliance in virtual environments, and futureproofing your virtualization roadmap.
Posted: 15 Sep 2010 | Published: 15 Sep 2010

Dell, Inc. and Intel®
201 - 225 of 806 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement