Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

FFIEC Compliance

RSS Feed   
DEFINITION: Conformance to a set of standards for online banking issued in October 2005 by the Federal Financial Institutions Examination Council (FFIEC). The standards require multifactor authentication (MFA) because single-factor authentication (SFA) has proven inadequate against the tactics of increasingly sophisticated hackers, particularly on the Internet.
FFIEC Compliance Reports
26 - 50 of 505 Matches Previous Page  |  Next Page
April Essential Guide to Data Protection
sponsored by SearchSecurity.com
EGUIDE: In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
Posted: 10 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Beyond Nine to Five
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, Ade McCormack offers guidance to enable you to move forward in your career with the minimum of anxiety as digital technology fundamentally changes the nature of work.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

ComputerWeekly.com

Big Data Analytics: How to work smarter with data-driven insights
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn about the state of adoption of data analytics in Australia, how Commonwealth Bank is making analytics tools more accessible to small companies and how SAS is prepping its marketers for the data flood.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

ComputerWeekly.com

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

AppManager 6.0.2 Trial
sponsored by SUSE
TRIAL SOFTWARE: The NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.
Posted: 09 Aug 2006 | Premiered: 01 Aug 2006

SUSE

Archiving Compliance with Sunbelt Exchange Archiver
sponsored by Sunbelt Software
WHITE PAPER: Archiving for compliance is an important step in securing your company's future. Learn how to implement an email archiving solution that will minimize the burden on your Exchange server and help to avoid costly legal penalties in this whitepaper.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

Archiving Lotus Domino for Storage Optimization and E-Discovery
sponsored by Symantec Corporation
WHITE PAPER: Address Lotus Domino Mail challenges with an email archive system that stores, manages and offers easy access and search of corporate data stored in email systems, file server environments, instant messaging platforms and content management systems.
Posted: 07 Aug 2007 | Published: 01 Jul 2007

Symantec Corporation

ArcSight Logger: Universal Log Management Solution
sponsored by ArcSight, an HP Company
PRODUCT OVERVIEW: ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

ArcSight, an HP Company

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders
sponsored by Information Security Magazine
EZINE: This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

Information Security Magazine

Authentication in the Enterprise: Current and Changing Requirements
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.
Posted: 25 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies

Balancing compliance with information security threat assessment
sponsored by IBM
EGUIDE: This expert tip guide will provide you with the necessary tactics to balance compliance and threat management within your company.
Posted: 06 Dec 2011 | Published: 06 Dec 2011

IBM

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Best Practices for Database Security and Compliance
sponsored by Guardium, an IBM Company
WEBCAST: Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)

Guardium, an IBM Company

Best Practices for Managing the Increasing Depth of Compliance Regulation
sponsored by IBM
EGUIDE: According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.
Posted: 18 May 2011 | Published: 18 May 2011

IBM

Best Practices for Printer Management in the Oracle E-Business Suite
sponsored by Unitask, Inc.
WHITE PAPER: Managing printers within the Oracle E-Business Suite is a complicated and time consuming matter. Read this white paper to learn best practices in printer management for Oracle applications.
Posted: 09 Mar 2007 | Published: 01 Jan 2006

Unitask, Inc.

Best practices for utilising SharePoint e-discovery capabilities
sponsored by Dell Software
EGUIDE: In this expert e-guide, discover how SharePoint 2010 can simplify e-discovery for your organisation. Plus, learn how to sell a governance plan to management by reminding them of the benefits.
Posted: 08 Sep 2011 | Published: 30 Aug 2011

Dell Software

Best Practices in Creating a Strategic Finance Function
sponsored by SAP America, Inc.
WHITE PAPER: the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

Best practices in managing requirements in Energy and Utilities industries
sponsored by IBM
WEBCAST: This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Posted: 27 Mar 2014 | Premiered: May 31, 2013

IBM

Best Practices: Enterprise SATA Deployment with High Performance and Reliability
sponsored by DataDirect Networks
WHITE PAPER: Across many organizations, the rapid growth of data is outpacing storage budgets. SATA disk based archive storage is the perfect solution. Download this white paper to learn more about disk based archive storage and see if it will work for you.
Posted: 24 Dec 2007 | Published: 01 Dec 2007

DataDirect Networks

Better Healthcare Starts with Better Information
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper examines Dell's holistic solutions, bringing together implementation services, process improvement consulting and customized IT technology so caregivers have better information for better patient care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

Beyond FTP: Securing and Managing File Transfers
sponsored by Linoma Software
WHITE PAPER: Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Linoma Software

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
26 - 50 of 505 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement