security

Results 6426 - 6450 of 7239Sort Results By: Published Date | Title | Company Name
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
     ProofSpace
By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software
     COMDOM Software
By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance, compliant, regulatory compliance, audit, auditing, cmdb, gisra, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Better preparation means better results – Learn how to prepare for an audit; how to develop a self-audit process; how to develop a security template; and much more.
Tags : security audit, audit, auditing, vulnerability assessment, vulnerability management, infrastructure, patch, patch management, compliance, holes, security holes, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Do you need to implement corporate policies regarding security and confidential health information? Learn: How to use IT documentation to prepare for and pass Security audits; What IT data is critical for Security Standards; What is the difference between Security and IT Audits. You can implement a sustainable HIPAA Security Standard – Read this paper to learn more.
Tags : hipaa, hippa, health care, healthcare, compliance, privacy, consumer data, data privacy, information management, customer data, consumer privacy, privacy, database security, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Learn the importance of change management in today's complex IT infrastructures.
Tags : change management, configuration management, it management, project management, compliance, compliant, audit, auditing, patch, patch management, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
A summary of the background of GLBA, the precedents it sets for securing nonpublic consumer information, and the responsibilities it places on senior management and IT departments to ensure customer data is safeguarded.
Tags : gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, network security, security, compliant, glba compliant, consumer privacy, database security, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
     Ecora Software
By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil, change management, ecora
     Ecora Software
By: Interactive Intelligence     Published Date: Feb 21, 2013
Comfort & Security in the Cloud - Read this white paper to learn how communications as a service delivers superior technology stability and resiliency. Learn about the world of the contact center and the technology today that offers richness and more
Tags : comfort and security in the cloud, white papers, learn communications, call centers, caas. communications as service, interactive intelligence
     Interactive Intelligence
By: OneNeck IT Services     Published Date: May 30, 2018
Use a proven framework now, protect your data and meet compliance mandates tomorrow.
Tags : 
     OneNeck IT Services
By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
     OneNeck IT Services
By: OneNeck IT Services     Published Date: May 30, 2018
Learn the real risks, and then find out how to reduce your exposure and combat attackers with Cisco’s 2018 Annual Cybersecurity Report.
Tags : 
     OneNeck IT Services
By: OneNeck IT Services     Published Date: May 30, 2018
Use a proven framework now, protect your data and meet compliance mandates tomorrow.
Tags : 
     OneNeck IT Services
By: AT&T     Published Date: Jun 25, 2008
When evaluating the pros and cons of DSL and cable modem Internet access, enterprises should factor speed, cost, installation, consistency and security into the decision-making process. While the right access choice is a function of location, availability and service offerings, DSL is often the better option for remote workers, satellite offices and traveling employees.
Tags : dsl, cable, internet, internet connection, connection, connectivity, data line, at&t, att, connection speed, isp
     AT&T
By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd, quantum key distribution, security
     AT&T
By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis, nevis networks, precision prospects
     Nevis Networks
By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects
     Nevis Networks
By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis, nevis networks, precision prospects
     Nevis Networks
Start   Previous    251 252 253 254 255 256 257 258 259 260 261 262 263 264 265    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com