4010 information technology white papers from 578 companies
Getting regulatory compliance wrong can be detrimental for any business. However, adhering to today’s complex regulatory environment requires careful planning. With a wide range of information related regulation from the Data Protection Act to HIPPA and the Computer Misuse Act your business as a financial entity must also implement appropriate operational risk frameworks (BASEL 2).
IThound’s resources include white papers, best practices, analyst reports and case studies that can help ensure your business is compliant.
Company: Quest Software UK
Monitoring Active Directory isn’t a new idea, but early techniques and tools were limited and often did not give complete data. This paper focuses on LDAP monitoring, a fundamentally different method. VIEW SUMMARY
Category: Auditing | Published: November 2012| Type: White Paper
Rating: + 1
An organisation has multiple stakeholders that need to be communicated with or reported to on a regular basis.Ensuring that all the stakeholders’ information needs are met requires a holistic approach to managing information – the creation of a GRC platform. Read this paper to find out more. VIEW SUMMARY
Category: Data Governance | Published: December 2013 | Type: White Paper
Identifying and understanding information security and privacy laws can be a complex task. Threats to your information, such as phishing and malware, are on the rise. In this paper, we consider how security awareness training can help mitigate inside and outside attacks by educating your workforce. VIEW SUMMARY
Category: Compliance | Published: December 2013 | Type: White Paper
Many organisations don't realise that the AS/400 has an SQL visbility problem. Unaware organisations are likely to face security problems and compliance fines. Unauthorised users on IBM i can access sensitive data, none of which is monitored. Read to find out more about these security issues. VIEW SUMMARY
Category: Access Control | Published: October 2013 | Type: White Paper
PCI compliance is serious, but proving it is time-consuming, complex and costly. When this compliance is called into question, a decentralised network infrastructure makes it inefficient for data security teams to resolve issues. Read this case study to explore the pain points of compliance. VIEW SUMMARY
Category: Data Security | Published: July 2013 | Type: Case Study
It is something we all do every day, so surely email management should be your organisations number one priority? Improper email management can lead to many risks so it imperative that you get it right, read this whitepaper to find out how. VIEW SUMMARY
Category: Email Management | Published: November 2012 | Type: White Paper
Rating: + 2
What's more important, security or compliance? Most IT shops are focused on compliance but breaches are still happening. A recent study concludes that evidence of those breaches tends to be right there in log files. But CISOs aren’t tapping into that intelligence and many breaches go undetected VIEW SUMMARY
Category: Regulatory Compliance (Basel II / Sarbanes Oxley/ HIPPA ) | Published: October 2012 | Type: White Paper
This white paper reviews the basics of PCI, including who must comply, compliance requirements, validation requirements and penalties. It also examines key things to look for when selecting a PCI network testing service. VIEW SUMMARY
Category: PCI DSS | Published: October 2012 | Type: White Paper
Rating: + 2
With the recent updates to PCI DSS where internal scanning is now required, get all the facts with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI. It arms you with the facts, in plain English VIEW SUMMARY
Category: PCI DSS | Published: October 2012 | Type: Article
Rating: + 2
This paper presents how the world of IT security, audit and compliance must change in cloud environments. This paper provides guidelines for auditors who must verify the effectiveness of security controls used within a cloud computing system VIEW SUMMARY
Category: Cloud computing | Published: October 2012 | Type: White Paper
Rating: + 1
As a member you receive free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.
© Incisive Media Investments Limited 2014, Published by Incisive Financial Publishing Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 04252091 & 04252093.