HIT Consultant Insightful coverage of healthcare innovation
 

manage compliance

Results 526 - 550 of 631Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Mar 06, 2007
Quocirca conducted two surveys separated by 12 months that looked at the data management infrastructure of UK and Irish businesses and how this was linked to their ability to respond to the whims of the regulators. In the year between the two surveys a lot had changed.
Tags : 
information management, data management, storage, compliance, regulatory compliance, knowledge management, information lifecycle, information lifecycle managment, quocirca, ireland
    
Quocirca
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : 
spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance, compliance, intrusion detection, 8e6, 8e6 technologies
    
8e6 Technologies
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn about the key challenges of PCI DSS v1.1 and how NetIQ Security Management, Configuration Control and Enterprise Administration solutions can help you demonstrate PCI compliance.
Tags : 
pci, pci dss, compliance, credit card, payment card, pci compliance, customer privacy, privacy, customer data, data privacy, data protection, net iq, netiq, cardholder
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : 
compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management, hipaa, hipaa compliance, vulnerability, vulnerabilities
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : 
pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring, access control, regulatory compliance, hipaa, fisma, audit, auditing, windows
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : 
security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance, pci, pci dss, sarbox, sox, sox compliance, fisma, basel ii, reporting, analysis, analytic, netiq, net iq
    
NetIQ Corporation
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
If you are spending too much time and money on SOX compliance, this white paper will help you identify where investments in technology could really pay off in time for your next SOX audit.
Tags : 
compliance, sarbox, sox, sarbanes oxley, sarbanes-oxley, sox compliance, sox audit, change management, access control, softlanding, soft landing
    
SoftLanding Systems
Published By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : 
application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection, cenzic
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : 
identity theft, application security, password management, security management, compliance, california sb 1386, senate bill 1386, ab 1950, cenzic
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic
    
Cenzic
Published By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : 
data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage, data replication, xiotech
    
Xiotech
Published By: Xiotech     Published Date: Mar 01, 2007
Many organizations have no policies in place for retaining, managing, and purging documents. This paper looks at some of the basic components of a document strategy—retention, management, and destruction—and highlights some of the current compliance drivers that make it all necessary.
Tags : 
archive management, email archiving, email archive, data warehousing, compliance, data retention, xiotech
    
Xiotech
Published By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes some easy-to-use data management tools that many companies are using to let business users do complex data updates and reporting tasks effortlessly. This technology is not only easing their Sarbanes-Oxley compliance, but is also saving these companies large amounts of time and money.
Tags : 
compliance, sox, sarbanes, sarbox, sarbanes-oxley, sarbanes oxley, data management, cost control, it spending, sap, winshuttle
    
Winshuttle
Published By: RiskWatch     Published Date: Feb 05, 2007
As corporate security policies and compliance regulations are created to address the increasingly dangerous post 9/11 environment, security risk management is becoming an increasingly important tool in corporate governance. Learn more in this white paper by RiskWatch.
Tags : 
network security, security, compliance, glba, hipaa, risk assessment, risk management, hipaa compliance, return on investment, roi, riskwatch
    
RiskWatch
Published By: LANDesk     Published Date: Feb 12, 2007
This paper shows how LANDesk Process Manager can allow you to design processes once, automate them everywhere and refine them as needed - saving money, ensuring compliance and keeping even the most complex processes running reliably.
Tags : 
it management, productivity, change management, project management, groupware workflow, automating it, it automation, process management, landesk
    
LANDesk
Published By: Infor     Published Date: Jul 23, 2007
Make EAM part of your Green Strategy; This white paper includes recommendations for a Green-centric Organization. Find out how a comprehensive, green-oriented asset performance management solution will enable you to achieve compliance, efficiency, and consumer appeal.
Tags : 
environment, environmental, social responsibility, greenhouse, greenhouse effect, green, gas emissions, environmentalism, global warming, asset management, enterprise asset management, eam, infor
    
Infor
Published By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : 
scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance, supply chain technology, wireless technology, wireless technologies, peak, peak technologies
    
PEAK Technologies, Inc.
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
Tags : 
email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c
    
C2C Systems, Inc.
Published By: Blue Lane     Published Date: Aug 31, 2007
Needing to implement a patch management solution to comply with SAS 70, Davidson found the solutions on the market lacking. They either required significant resources to test all patches, or were expensive automated solutions. Then, Davidson learned about Blue Lane Technologies, a concept that Davidson loved.
Tags : 
server virtualization, server security, network security, patch management, sas70, sas 70, compliance, sox compliance, sarbox compliance, hotels, hotelier, hospitality, case study, secure server, bluelane, blue lane
    
Blue Lane
Published By: Blue Lane     Published Date: Oct 01, 2007
The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.
Tags : 
healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa, hippa, hipaa compliance, sox, sox compliance, risk management, records management, medical records, bluelane, blue lane
    
Blue Lane
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru
    
Decru
Published By: GFI     Published Date: Jun 08, 2007
This white paper examines the requirements to adhere to the Payment Card Industry Data Security Standard (PCI DSS), the implications of non-compliance and how effective event log management and network vulnerability management can help achieve compliance.
Tags : 
pci, credit card, payment card, compliance, mastercard, database security, privacy, consumer, customer, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
event management, performance management, employee performance, roi, return on investment, information management, records management, network management, compliance, records, gfi
    
GFI
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.