Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Financial Services Modernization Act of 1999

RSS Feed    Add to Google    Add to My Yahoo!
Financial Services Modernization Act of 1999Reports
 
Security Compliance:  A Common Thread
sponsored by CDW Corporation
RESOURCE: Access this infographic to discover how to properly secure your information and meet major compliance mandates for healthcare, finance and government data.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

CDW Corporation

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Practical Guide to Understanding and Complying with the Gramm-Leach-Bliley Act
sponsored by Ecora Software
WHITE PAPER: New whitepaper on GLBA - learn key steps for validating compliance with the Gramm-Leach-Bliley Act, the background of GLBA - what it is and who must adhere, and how senior management and IT departments must ensure that customer data is safeguarded.
Posted: 16 Jan 2007 | Published: 16 Jan 2007

Ecora Software

IDC White Paper: Effective Information Security
sponsored by CA (India) Technologies Pvt. Ltd
ANALYST REPORT: Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...
Posted: 29 Apr 2010 | Published: 25 Sep 2009

CA (India) Technologies Pvt. Ltd

Whitepaper: Roadmap to Effective eGovernment
sponsored by EMC Corporation
WHITE PAPER: This detailed handbook covers four stages – from paper-based dependency to the achievement of connected government. A best-practices roadmap will offer you the ideal strategy for your current information infrastructure.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

EMC Corporation

Combating Insider Threats - The Application-level User Behavior Tracking Approach
sponsored by Intellinx Software Inc.
WHITE PAPER: This white paper looks at the growing problem of the insider threat and discusses the regulatory and other drivers that fuel the demand for new security solutions in this area. Find out how to mitigate insider threats and read this paper today.
Posted: 17 May 2007 | Published: 01 Apr 2006

Intellinx Software Inc.

Log Management Best Practices
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA, The Security Division of EMC

E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE: While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010

ArcSight, an HP Company

Outbound Email and Data Loss Prevention in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper overviews a survey completed by Proofpoint and Forrester Consulting that analyzes the legal, financial, and regulatory risks associated with outbound email in large enterprises.
Posted: 05 Feb 2009 | Published: 01 May 2008

Proofpoint, Inc.

Managing the Cost and Complexity of Compliance through Governance
sponsored by McAfee, Inc.
PRESENTATION TRANSCRIPT: Read this presentation transcript for a discussion on risk management, corporate governance, regulatory compliance, and information quality presented by speaker Laurence Anker.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

McAfee, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement