HIT Consultant Insightful coverage of healthcare innovation
 

manage compliance

Results 401 - 425 of 637Sort Results By: Published Date | Title | Company Name
Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management
    
Nemx Software Corporation
Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance
    
Nemx Software Corporation
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Net Atlantic     Published Date: Dec 08, 2009
How to Keep Compliant, Avoid Mistakes, and Manage a Healthy Member List. Net Atlantic's whitepaper, "Email Compliance & Best Practices for Healthcare" helps healthcare providers and healthcare product and service vendors understand email communications compliance issues. It illustrates how CAN-SPAM forms the foundation of compliance, and also explains why healthcare organizations have to go beyond CAN-SPAM to sustain a truly effective email communications strategy. Healthcare users of email for communications should know how to use these best practices before building their email campaigns.
Tags : 
net atlantic, email compliance, spam, can-spam, healthcare, members, hmtl messages, email marketing
    
Net Atlantic
Published By: NetApp     Published Date: Feb 22, 2010
Centralize storage to reduce costs, achieve compliance, and provide disaster recovery.
Tags : 
netapp, operating cost, it management, tco, centralize storage, compliance regulations, disaster recovery, business agility
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
Download IDC's paper to learn how a single data management tier across on-premise and multiple clouds is critical to making hybrid cloud and multicloud environments effective. This foundation for digital transformation success helps businesses: improve time to market, cut compliance risk, and†enable businesses to innovate at an accelerated pace.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : 
pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft
    
netForensics
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance
    
netForensics
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
    
netForensics
Published By: NetIQ     Published Date: Dec 23, 2010
This white paper describes three significant issues with Group Policy change management using native tools and describes a solution for applying best practices for change management.
Tags : 
netiq, change management, microsoft group policy, compliance auditing, recovery
    
NetIQ
Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event, infrastructure, threat, threat detection
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper to learn how you can meet the growing needs of both your Identity Management systems and Access Governance systems by bringing business and IT together.
Tags : 
iag, identity and access governance, identity management, compliance
    
NetIQ
Published By: NetIQ     Published Date: Nov 05, 2012
The broad adoption of SIEM technology is driven by security and compliance needs. Targeted attack discovery requires effective user activity, data access and application activity monitoring. Vendors are testing demand for broader-scope solutions.
Tags : 
siem technology, threat management, security management, enterprise security, compliance
    
NetIQ
Published By: NetIQ     Published Date: Nov 05, 2012
User administration solutions manage identities and their attributes across systems, applications and resources. Buyers seek to demonstrate regulatory compliance while reducing project deployment times and costs.
Tags : 
iam, identity and access management, iam initiatives, security compliance
    
NetIQ
Published By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Is change and complexity causing you to rethink your approach to identity, security and governance? Examine some of the challenges organizations face when developing and adapting a compliance program.
Tags : 
iag, identity management, access governance, it security, compliance
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet ITís demands and simple for non-IT professionals to manage.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.