Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FFIEC Compliance

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Conformance to a set of standards for online banking issued in October 2005 by the Federal Financial Institutions Examination Council (FFIEC). The standards require multifactor authentication (MFA) because single-factor authentication (SFA) has proven inadequate against the tactics of increasingly sophisticated hackers, particularly on the Internet.
FFIEC ComplianceReports
226 - 250 of 790 Matches Previous Page  | Next Page
Ease GLBA Compliance with LogRhythm
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

EDRM & IGRM: From E-Discovery to Information Governance
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: In this classroom, learn how to apply the Electronic Discovery Reference Model (EDRM) and the information governance reference model (IGRM) frameworks to reduce risk and cost and develop strong processes and procedures for addressing information governance in your organization.
Posted: 08 Aug 2013 | Premiered: 13 Aug 2013

SearchCompliance.com

E-Guide: Are 'strong authentication' methods strong enough for compliance?
sponsored by Entrust, Inc.
EGUIDE: Although strong authentication methods have gained some momentum in the past years, they haven’t become completely widespread enough to replace passwords. This expert E-Guide discusses why this is the case. Uncover the challenges and benefits of strong authentication implementation and if these methods are strong enough for compliance.
Posted: 27 Sep 2011 | Published: 26 Sep 2011

Entrust, Inc.

E-Guide: Balancing compliance with information security threat assessment
sponsored by CA Technologies.
EGUIDE: Implementing the rules and regulations of a specific industry can be difficult, making it hard for companies to accomplish the task at hand: being successful. In this expert E-Guide, you will learn that the hassle of compliance is worth it in the long run for your company and can be worked into your everyday culture.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

CA Technologies.

E-Guide: Evaluating cloud security concerns
sponsored by CA Technologies
EGUIDE: The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions.
Posted: 29 Jun 2011 | Published: 29 Jun 2011

CA Technologies

E-Guide: GARP and How it Helps you Achieve Better Information Governance
sponsored by IBM
EGUIDE: This e-guide answers the most frequently asked questions about information governance and GARP. Continue reading to get a firm introduction to GARP and information governance as a whole.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

E-Guide: Planning for virtualized disaster recovery in a health care setting
sponsored by BridgeHead Software
EGUIDE: Many enterprises have embraced virtualized disaster recovery because it restores functions with minimal hardware. Health care orgs can do this too, if they keep HIPAA in mind. Check out this e-guide for more information about planning your virtualized disaster recovery in a health care setting.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

BridgeHead Software

E-Guide: Prioritizing Application Security Concerns
sponsored by Coverity
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

Coverity

E-Guide: Securing the cloud
sponsored by CA Technologies.
WHITE PAPER: The cloud has become a very popular way to cut costs and get ahead but the need for security standards is increasing at a rapid pace. Individuals all over, in diverse areas of business want to know that their information will/can be safe in the cloud. Read this expert E-Guide to gain an understanding for a necessary security standard in the cloud.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

CA Technologies.

E-Guide: Selecting a SIM for midmarket business
sponsored by HP Enterprise Security
EGUIDE: This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
Posted: 01 Nov 2011 | Published: 31 Oct 2011

HP Enterprise Security

E-Guide: Steps to securing your file transfers and meeting compliance requirements
sponsored by OpenText
EGUIDE: Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
Posted: 09 Jan 2012 | Published: 09 Jan 2012

OpenText

E-Guide: Using web application firewalls to ease compliance efforts
sponsored by Imperva.
EGUIDE: When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Imperva.

E-Guide: Shortcut guide to Web application firewall deployment
sponsored by Imperva
EGUIDE: Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Imperva

E-mail Archive Solutions Bring IT Efficiencies and Compliance
sponsored by Datalink and NetApp
WHITE PAPER: Email data is growing in most organizations at a tremendous rate and, consequently, becoming more difficult to manage.
Posted: 02 Oct 2006 | Published: 01 May 2006

Datalink and NetApp

eBook - Email Retention: Standards and Practices
sponsored by SearchCompliance.com
EBOOK: Electronic records are as real as paper documents. In this SearchCompliance eBook, you'll learn the importance of having a records retention policy and how to properly manage the data for e-discovery and recovery in your organization.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

SearchCompliance.com

eBook-- Defining an Email-Archiving Policy
sponsored by Symantec Corporation
EBOOK: Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.
Posted: 09 Jul 2009 | Published: 09 Jul 2009

Symantec Corporation

eBook: Compliance for the Midmarket: Governance, Risk and Technology
sponsored by SearchCIO.com
EBOOK: Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
Posted: 09 Jun 2009 | Published: 09 Jun 2009

SearchCIO.com

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

eBook: Email Archiving - Planning, Policies and Product Selection: Analyzing Email Archiving Features for Productivity
sponsored by Symantec Corporation
EBOOK: Chapter 4 of this e-book gives advice on determining your email archiving goals and policies to establish a set of system features that match your company’s needs and boost archiving efficiency.
Posted: 09 Oct 2009 | Published: 01 Oct 2009

Symantec Corporation

eBook: IT in the Electronic Hospital
sponsored by SearchCIO.com and SearchSecurity.com
EBOOK: The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.
Posted: 19 Oct 2009 | Published: 19 Oct 2009


eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
sponsored by SearchSecurity.co.UK
EBOOK: Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

SearchSecurity.co.UK

eBook: The Green Data Center 2.0: Energy Efficient Computing in the 21st century
sponsored by Hewlett Packard Company and Intel
EBOOK: Chapter 4 of the eBook, Green Data Center, picks up where the other previous chapters left off in the plan for going green in the data center. This chapter takes a step back and looks at the project from a holistic point of view for creating a green and energy efficient data center.
Posted: 12 May 2009 | Published: 12 May 2009

Hewlett Packard Company and Intel

eBook: The Pillars of Employee Performance Management
sponsored by SumTotal Systems, Inc.
EBOOK: Now more than ever, HR professionals are tasked with optimizing performance management processes across the board, so they can ensure the most efficient use of corporate resources. Performance management will lead a company toward better engaging, retaining, and developing its most valuable asset: the workforce.
Posted: 11 Mar 2009 | Published: 11 Mar 2009

SumTotal Systems, Inc.

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies
sponsored by SearchSecurity.com
EBOOK: Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

SearchSecurity.com
226 - 250 of 790 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement