HIT Consultant Insightful coverage of healthcare innovation
 

industry standard

Results 101 - 125 of 145Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Apr 21, 2010
Make compliance just another part of your processes by taking an operational approach to security.
Tags : 
tripwire, compliance, security, business continuity, security management, payment card industry, data security standard, pci dss
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.
Tags : 
tripwire, pci dss compliance, it security, automation solution, payment card industry, data security standard, audit
    
Tripwire
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit
    
Tripwire, Inc
Published By: Vendor Safe Technologies     Published Date: Jan 21, 2010
The Most Common PCI Compliance Mistakes of Brick-and-Mortar Locations
Tags : 
vendor safe technologies, pci security deficiency, firewall, remote access, authentication, wireless network, point of sale software, credit card
    
Vendor Safe Technologies
Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
    
IBM
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS, Inc.
Published By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs, wikis, e-mails, instant messaging, predictive analytics, bottom up approach, documents, customer relationship management, crm, voice of the customer, competitive landscape, security threats, understanding text
    
SPSS Inc.
Published By: IBM     Published Date: Mar 24, 2009
Electronics and Software Engineering are quickly merging with traditional Mechanical Engineering to create a new paradigm in auto manufacturing: Mechatronics. Industry experts predict that this shift will bring about profound advances in automotive product development. Unfortunately, existing IT and process infrastructures do not provide sufficient capabilities to support the new paradigm: multiple data silos, a lack of standardized processes, and integration issues on a tool level (Mechanical, Electronic, Software) continue to pose serious obstacles to development efficiency, and remain a frequent source of delays, quality issues and cost increases.
Tags : 
ibm, ibm telelogic, automotive system design, mechanical engineering, mechatronics, oems, electronic stability programs, esp, electric overlay steering, ancillary systems, active lighting, pdm, product data management, pcb-layout domains, ptc, automotive product development system, sourcing, engineering, engineering change orders, ecos
    
IBM
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Fault Tolerant is a pretty common term in the world of IT, also an often misused and misleading term.  For 3 decades, Stratus Technologies has been engineering and manufacturing purpose built Fault Tolerant solutions. Check out this short video to understand what it takes to be REAL Fault Tolerant.
Tags : 
stratus, virtualization, fault tolerance, real fault, it management, industry standard components, disaster prevention
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Terry Bass, V Series and OpenVOS Product Manager, discusses the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the world’s most reliable operating system. VOS is now OPEN.
Tags : 
stratus, openvos, open source applications, unix, linux, gnu tools, debugging tools, industry standard, ipsec, ntp, openssh, radius, samba
    
Stratus Technologies
Published By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : 
ibm, pci dss, compliance
    
IBM
Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data
    
ArcSight
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking
    
Quocirca
Published By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : 
dell, microsoft windows server 2008, structured solution designs, windows migration
    
Dell Windows Server
Published By: HP - Enterprise     Published Date: Nov 19, 2008
With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.
Tags : 
howard schmidt, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.