Security And Compliance Automation For Financial Services
sponsored by Red Hat
WHITE PAPER:
A SANS Institute survey showed that unauthorized access is the No. 1 concern around cloud environments. This is especially true for businesses in financial services, who must maintain constant compliance amidst grueling regulations. By downloading this white paper, learn how automation can help these businesses remain both secure and compliant.
Posted: 15 Mar 2021 | Published: 14 Jan 2021
|
|
|
How Data Security Enables Cross-Regulatory Compliance
sponsored by Comforte AG
WHITE PAPER:
Understanding current regulatory expectancies and complying accordingly is crucial to the survival of any business storing potentially at risk data. Read this white paper to learn about recent international data protection regulations and discover how you can develop a data-centric compliance strategy.
Posted: 08 Feb 2021 | Published: 31 Jan 2019
|
|
|
The Adobe EchoSign advantage for financial services
sponsored by Adobe EchoSign
WHITE PAPER:
E-signatures offer financial institutions sustainable competitive advantages while meeting high industry standards. Access this white paper to learn more.
Posted: 23 Feb 2015 | Published: 23 Feb 2015
|
|
|
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER:
Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013
|
|
|
IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER:
Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013
|
|
|
Using An E-Signature Solution To Save Time and Money
sponsored by Adobe EchoSign
WHITE PAPER:
The following white paper explores the top 8 reasons why you should consider an e-signature solution for your organization. Learn how e-signatures can vastly improve the time to close deals, improve compliance, save capital, and much more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014
|
|
|
CFO Insights on Success: How Automation Can Help
sponsored by Concur Technologies
WHITE PAPER:
The following white paper to explore the current challenges and bottlenecks that face CIOs and FDs at the financial year-end. Learn the importance of automation technology and how it can drastically improve visibility, reporting, and ultimately, a simpler year-end.
Posted: 09 Jun 2014 | Published: 09 Jun 2014
|
|
|
Maintaining Continuous Compliance: A New Best-Practice Approach
sponsored by IBM
WHITE PAPER:
This resource highlights a new approach to compliance that offers continuous visibility to reduce the amount of risk, lower costs, and improve overall security.
Posted: 13 May 2014 | Published: 30 Jun 2014
|
|
|
3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER:
This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 09 May 2014 | Published: 09 May 2014
|
|
|
A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER:
This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013
|
|
|
Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER:
This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011
|
|
|
Understanding E-Discovery Software Requirements
sponsored by Exterro
WHITE PAPER:
This IT buyer's guide dives into eDiscovery software requirements by highlighting the capabilities commonly needed by IT teams and how a web-based legal process management software suite meets these requirements.
Posted: 10 Apr 2014 | Published: 10 Apr 2014
|
|
|
Eliminating E-Discovery Over-Collection
sponsored by Exterro
WHITE PAPER:
This informative white paper describes the role of proportionality in today's collection practices, as well as the 5 best practices for defensibly reducing electronically stored information (ESI) collections.
Posted: 09 Apr 2014 | Published: 09 Apr 2014
|
|
|
PCI DSS compliance 101
sponsored by DellEMC and Intel®
WHITE PAPER:
This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
|
|
|
Data Center Designs to Help Meet Your Compliance Challenge
sponsored by Iron Mountain
WHITE PAPER:
This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.
Posted: 27 Jan 2014 | Published: 27 Jan 2014
|
|
|
Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER:
This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013
|
|
|
Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER:
This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013
|
|
|
Rules, risk and the potential for profit in the world of Basel III
sponsored by IBM
WHITE PAPER:
Bob Boettcher, Senior Director of Market and Credit Risk and David Wechter, Senior Director, Collateral, IBM, discuss the impact of regulatory reform on global banking, industry best practices for counterparty credit risk and CVA, and the new breed of solutions that will enable banks to profit in the regulatory environment of Basel III
Posted: 30 Sep 2013 | Published: 30 Sep 2013
|
|
|
An insurance firm eases regulatory compliance while reducing risk
sponsored by IBM
WHITE PAPER:
Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk.
Posted: 13 Sep 2013 | Published: 13 Sep 2013
|
|
|
Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER:
Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012
|
|
|
Tripwire IT Security and Compliance Automation Solutions: Empowering IT Security
sponsored by Tripwire, Inc.
WHITE PAPER:
View this informative white paper to learn how you can improve your IT security practices. Uncover some of the toughest challenges to maintaining Confidentiality, Integrity, and Availability (CIA). Uncover the sensitive data that needs protection as well as security policies and controls that could lead to a false of security.
Posted: 26 Sep 2012 | Published: 26 Sep 2012
|
|
|
Law & The Data Explosion
sponsored by Symantec Corporation
WHITE PAPER:
This white paper explores the relationship between developments in the way the legal profession locates, identifies and recovers today's new breed of digital evidence, and the ever-growing amounts of data organizations are expected to store. Read now to learn more.
Posted: 05 Sep 2012 | Published: 30 Sep 2010
|
|
|
Rewriting the Rules of Patch Management
sponsored by IBM
WHITE PAPER:
By implementing more patches, software vendors are keeping pace with malware exploits. Consult this informative white paper to learn more about patch management and how it can benefit your business. Virtually eliminate the risks to your company by following these steps.
Posted: 24 Aug 2012 | Published: 09 Feb 2011
|
|
|
Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER:
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012
|
|
|
Closed-loop Records Management: The Stakes Are Too High to Ignore
sponsored by RSD
WHITE PAPER:
As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.
Posted: 15 Feb 2012 | Published: 15 Feb 2012
|
|