Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FFIEC Compliance

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Conformance to a set of standards for online banking issued in October 2005 by the Federal Financial Institutions Examination Council (FFIEC). The standards require multifactor authentication (MFA) because single-factor authentication (SFA) has proven inadequate against the tactics of increasingly sophisticated hackers, particularly on the Internet.
FFIEC Compliance Reports
201 - 225 of 776 Matches Previous Page  |  Next Page
E-Book: Technical Guide on Web Application Firewalls
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

SearchSecurity.com

E-Guide: Achieving compliance through IAM
sponsored by SearchSecurity.com
EGUIDE: Read this expert E-Guide to learn the best practices for using role management as a tool to meet compliance regulations.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

SearchSecurity.com

E-Guide: Are 'strong authentication' methods strong enough for compliance?
sponsored by SearchSecurity.com
EGUIDE: Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
Posted: 27 Sep 2011 | Published: 26 Sep 2011

SearchSecurity.com

E-Guide: Balancing compliance with information security threat assessment
sponsored by SearchSecurity.com
EGUIDE: Implementing the rules and regulations of a specific industry can be difficult, making it hard for companies to accomplish the task at hand: being successful. In this expert E-Guide, you will learn that the hassle of compliance is worth it in the long run for your company and can be worked into your everyday culture.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchSecurity.com

E-Guide: Evaluating cloud security concerns
sponsored by SearchSecurity.com
EGUIDE: The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

SearchSecurity.com

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker
sponsored by i365, makers of Evault
WHITE PAPER: In this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

i365, makers of Evault

Disk-Based Backup & Recovery
sponsored by Datalink Corp
WEBCAST: Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are.
Posted: 03 Jan 2008 | Premiered: Jan 16, 2008, 12:30 EST (17:30 GMT)

Datalink Corp

Document Management: A Practical Guide for Accounting and IT in Midsized Organizations
sponsored by ACOM Solutions, Inc.
WHITE PAPER: This paper summarizes the challenges faced by Accounting and IT departments in midsize organizations, and presents a list of "must have" document management capabilities for each department.
Posted: 05 Apr 2007 | Published: 01 Apr 2007

ACOM Solutions, Inc.

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Driving to Best Practices in Archiving
sponsored by Plasmon
WHITE PAPER: Archiving has become an imperative in today's legal, regulatory and IT-complex environments. But without a strategy in place, you can run into challenges. This white paper outlines archiving best practices to help you manage your critic...
Posted: 30 Apr 2007 | Published: 01 Mar 2007

Plasmon

Duet Beat Newsletter, March 2007
sponsored by Duet for Microsoft Office and SAP
NEWSLETTER: Duet provides key reporting and analytics capabilities, helping end-users access up-to-date enterprise information from mySAP applications from within the familiar Microsoft Office environment.
Posted: 23 Apr 2007 | Published: 01 Mar 2007

Duet for Microsoft Office and SAP

Duet Software Technical Overview: Bringing Together Business Productivity and Enterprise Applications
sponsored by Duet for Microsoft Office and SAP
WHITE PAPER: Duet creates tremendous value for both end users and IT organizations. Read this technical brief to discover the support scenarios, architecture overview, Duet software architecture advantages and hardware and software requirements.
Posted: 23 Apr 2007 | Published: 01 Apr 2007

Duet for Microsoft Office and SAP

e-Book: Chapter 2 - Building Bridges between IT Shops, Legal Teams and Security Staff
sponsored by Symantec Corporation
BOOK: This e-book provides expert information on how to bridge the gap between IT management, security staff, and legal terminology.
Posted: 27 May 2008 | Published: 26 May 2008

Symantec Corporation

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
sponsored by Symantec Corporation
BOOK: This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
Posted: 01 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

E-Book: IT in the Electronic Hospital
sponsored by Imprivata
EBOOK: The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.
Posted: 11 Feb 2010 | Published: 11 Feb 2010

Imprivata

E-Book: Log Management for Compliance
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

SearchSecurity.com & SearchCompliance.com

E-Book: NERC Compliance
sponsored by SearchSecurity.com
EBOOK: SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

SearchSecurity.com

E-Book: Smart Virtualization Decisions
sponsored by Dell, Inc. and Intel®
EBOOK: This e-book provides a roadmap to virtualization success for CIOs and strategic IT. Topics include: how to align virtualization with business priorities, virtualization beyond the server has its rewards, maintaining compliance in virtual environments, and futureproofing your virtualization roadmap.
Posted: 15 Sep 2010 | Published: 15 Sep 2010

Dell, Inc. and Intel®

E-Discovery Cloud Considerations
sponsored by Symantec Corporation
EGUIDE: In this expert e-guide, discover key considerations in preparing for a discovery request in the cloud. Learn about the legal requirements for the preservation of evidence, storage duration and cost, and more by clicking through now.
Posted: 04 Dec 2012 | Published: 04 Dec 2012

Symantec Corporation

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

E-Discovery, Case Management & Litigation Hold: Comprehensive Archive and Search Capability to Meet Legal and Regulatory Requirements
sponsored by Mimecast
DATA SHEET: Mimecast Unified Email Management™ is a cost effective Software-as-a-Service solution that offers integrated E-Discovery, Litigation Hold and Case Managment functionality, giving you the tools you need to rapidly execute data preservation policies and email discovery requests and guard against the risk of failing to produce required information.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Mimecast

E-Guide: 10+ Tips on Building a Strong Records Management/Data Retention Policy
sponsored by StoredIQ
EGUIDE: Is your company in line with e-discovery requests? This expert E-Guide provides a crash course on everything e-discovery by outlining 10 steps to building a records retention management system and also discusses three main objectives in developing an electronic data retention policy.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

StoredIQ

E-Guide: 6 Things Every New MSP Needs to Know about the Business
sponsored by Nimsoft, Inc.
EGUIDE: While many VARs, integrators and solution providers are offering “services,” there remains a substantial portion that either have only a small amount of revenue coming from managed services or no managed services practices at all. This guide will walk you through the 6 best practices you need to know about being a managed service provider.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Nimsoft, Inc.

E-Guide: GARP and How it Helps you Achieve Better Information Governance
sponsored by IBM
EGUIDE: This e-guide answers the most frequently asked questions about information governance and GARP. Continue reading to get a firm introduction to GARP and information governance as a whole.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine
201 - 225 of 776 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement