regulations

Results 51 - 75 of 308Sort Results By: Published Date | Title | Company Name
By: NetIQ     Published Date: Oct 25, 2012
An organization that excels at automating, standardizing and monitoring its systems and access controls can comply not only with PCI DSS, but with many other state and federal regulations that have similar mandates. Download this paper to learn more.
Tags : pci dss, compliance, saas, data security, user activity monitoring, it security, security, it management
     NetIQ
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security, networking, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : networking, security, it management
     CDW-Trend Micro
By: Oracle     Published Date: Feb 21, 2018
Few industries have seen as much change in recent years as the healthcare sector. Sweeping legislation, a new incentive structure, a raft of regulations, and an emphasis on wellness rather than mere “sick care” have altered the clinical and administrative landscapes. Oracle is helping healthcare organizations deliver great patient experiences with a cloud-based strategy that uses innovative technology to meet the needs of everybody involved in the continuum of care.
Tags : 
     Oracle
By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
     XpertHR
By: NACR     Published Date: Feb 09, 2015
Do you know what the compliance issues are for your organization and the technology solutions you might consider? Download this guide to learn what you need to know.
Tags : nacr, compliance, technology, technology solutions, regulations, software compliance – contact center, data security, customer security, hippa, biometrics, wfo, speech analytics, sarbanes-oxley, big data, telecommuting, remote agent, telemarketing, caller id, call recording, predictive dialers
     NACR
By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management
     Computhink
By: Workforce Software     Published Date: May 26, 2015
Inform your HR and labor practices with this list of issues to watch, compiled and analyzed by WorkForce Software’s Director of Compliance. Honing in on U.S. wage, hour, and absence regulations, this paper runs the gamut of compliance factors, including: • Legislative developments • Key court decisions • Enforcement actions • Common employer mistakes • Emerging trends
Tags : labor practices, hr practices, compliance, compliance update
     Workforce Software
By: Compass Datacenters     Published Date: Jul 07, 2015
Read this white paper to learn why ensuring that your data center is in compliance with the appropriate requirements is extremely important.
Tags : data center compliance, data center requirements, data center regulations, it management
     Compass Datacenters
By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases
     McAfee
By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : tripwire, configuration, compliance, infrastructure
     Tripwire
By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : quocirca, content security, aep networks, clearswift, symantec, trend micro, websense, smtp, security, data management
     Quocirca
By: Skillsoft     Published Date: Mar 13, 2015
Most companies are well aware of the risks bribery and corruption pose when operating in the global marketplace. However, what companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives. With the recent up-tick in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in other areas of the globe, including upcoming legislation in Ireland, knowledge of bribery rules and regulations has never been more critical.
Tags : skillsoft, corruption, bribery, foreign corrupt practices act, fcpa, compliance, compliance initiatives
     Skillsoft
By: UPS     Published Date: Sep 01, 2017
Growth in new markets introduces new costs to control, regulations to manage, and supply chain complexities to solve. Longer, more complicated cold chains mean that collaboration with third party logistics providers (3PLs) can help make the difference between profitable simplicity and unmanageable complexity. Companies are increasingly relying on their 3PLs for services such as monitoring and intervention, contingency planning, and cost control. Reduce risk by improving packaging, visibility, and establishing QA best practices. Improved visibility, new tools, new monitoring capabilities and appropriate packaging can also help drive down costs for shippers.
Tags : healthcare, cold chain, efficiency, ups, practices
     UPS
By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : corporate governance, capital requirements, information security, erm program, enterprise risk management
     Fiserv
By: Oracle     Published Date: Nov 07, 2018
Download this white paper for insight into the most common barriers that hinder businesses and the practical tips to break through and accelerate. • Customer Acquisition • Cash Flow Visibility • Tackling Regulations
Tags : 
     Oracle
By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, security
     Utimaco
By: Intralinks     Published Date: Feb 23, 2016
To explore the impact of evolving data privacy regulations and data sovereignty, Ovum was commissioned in Q3 2015 by Intralinks to conduct an international survey of 366 IT decision-makers.
Tags : intralinks, data privacy, ovum, data security, security, data management
     Intralinks
By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : data privacy, technology, data, security, safeguards, cloud computing, enterprise applications, data management, business technology, data center
     Intralinks
By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
     Dell EMC
By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
     NAVEX Global
By: VMware AirWatch     Published Date: Sep 21, 2016
Deliver better services, reduce expenses and comply with regulations are familiar business demands heard by financial services IT leaders. Simultaneously, the time and cost of managing custom apps to run core business operations continues to rise. Not only does this obstruct the speed of innovation adoption, it also increases the need for better end user experiences due to app management volume. How can financial services IT teams enable more efficacy alongside business growth, while reducing their own IT management burden? This ebook examines four ways financial services organizations can deliver apps and manage users at scale while reducing costs and optimizing existing investments.
Tags : 
     VMware AirWatch
By: IBM     Published Date: Apr 23, 2015
Banks face many challenges as they strive to return to pre-2008 profit margins including reduced interest rates, unstable financial markets, tighter regulations and lower performing assets. Fortunately, banks taking advantage of big data and analytics can generate new revenue streams. Watch this real-life example of how big data and analytics can improve the overall customer experience.
Tags : ibm, big data, profit margins, regulations, analytics, customer experience, banking, bank, data management, business technology
     IBM
By: ITinvolve     Published Date: Jun 01, 2012
Demonstrating PCI compliance with policies and regulations is an IT necessity, especially when periodic audits are conducted. ITinvolve has a better approach to change management with the capability to identify official PCI systems and their associated policies and documentation thus eliminating manual processes and reducing the risk of errors and delays.
Tags : it operations, information technology, audit, compliance, pci, governance, business technology
     ITinvolve
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com