This Week's Issue
Browse All Issues
Search All Articles
Product News & Information
News & Information
General Feature Articles
You Searched For:
Articles in the Security - Compliance & Enforcement category
Number of Matches:
1 of 2
Change Your Search
Results are sorted in Volume and Issue order, alphabetical by first letter of title.
Help For Merchants That Accept Credit Cards
- Understanding The Changes In PCI DSS Version 2.0
March 25, 2011,
Vol. 33, Issue 6
PCI DSS recognizes virtualization technology such as virtual machines, virtual switches/routers, virtual appliances, virtual applications/desktops, and hypervisors.
Vulnerabilities & Compliance Consume Most IT Security Time
January 14, 2011,
Vol. 33, Issue 1
Unpatched vulnerabilities and regulatory compliance are dominating the workloads of most IT security professionals, according to eEye Digital Security’s “2011 Vulnerability Management Trends Research Report.” Some believe that these vulnerabilities are so common because software companies don’t take enough time to include in-depth security features in their products.
Tips For PCI DSS Compliance
- Compliance Is Important, But So Is Security
December 17, 2010,
Vol. 32, Issue 26
Compliance and security go hand in hand. Here are some ways to make sure your enterprise can be both.
- Reduce Risks & Costs By Doing It Right
September 10, 2010,
Vol. 32, Issue 19
Here, we focus on the main national laws and mandates, but tracking events in state privacy regulations is highly recommended.
- There Are Many Important Lessons To Be Learned When Dealing With PCI & Regulatory Compliance
April 23, 2010,
Vol. 32, Issue 9
Managers need to take past mistakes dealing with PCI and regulatory compliance into consideration and spend more time on items including security strategies, monitoring, logs, mail archiving, and e-discovery.
Prepare For A Regulatory Compliance Audit
- What Steps Your SME Needs To Take
April 9, 2010,
Vol. 32, Issue 8
Nowadays, practically every industry has its own host of mandates and regulations that must be complied with in order to achieve some form of certification in that space, and audits are an inescapable and often dreaded part of that process.
Control Your Risks
- SymSoft ControlPanelGRC Suite Aids In Regulation Management & Compliance
February 26, 2010,
Vol. 32, Issue 5
SymSoft ControlPanelGRC Suite
Ace Security Audits
- Focus On Your SME’s Overarching Security Policy
January 1, 2010,
Vol. 32, Issue 1
If you thought you were through with exams after you finished college, you were wrong, as the need to ace security compliance exams rests heavily on IT.
- The Security Expert In A Box
June 5, 2009,
Vol. 31, Issue 16
The ArcSight Express family is designed for enterprises that may not have the IT resources to staff a full security center.
LogLogic Compliance Manager
- Stay Compliant
May 22, 2009,
Vol. 31, Issue 15
The LogLogic Compliance Manager notifies users of their compliance status, centralizes all compliance-related activities, and provides policy mapping to ensure regulations are met.
- Drive Down Costs, Drive Up Productivity & Profitability
November 7, 2008,
Vol. 30, Issue 45
Lumigent’s AppGRC suite of applications is designed to help companies drive down compliance costs while improving governance-driven productivity and profitability.
Internet Filtering Software
- Does Regulating Your Employees’ Online Activities Do More Harm Than Good?
October 31, 2008,
Vol. 30, Issue 44
Now that Internet access has become a standard business tool, IT is challenged to ensure employees don’t misuse the privilege.
- The Importance Of Having Steps In Place For Legal Discovery
October 10, 2008,
Vol. 30, Issue 41
If SMEs don’t have strategies and technologies in place to manage and retrieve unstructured data to fulfill e-discovery requests, they can face sanctions, fines, and fees.
Configuresoft Compliance Checker
- Compliance For Free
October 3, 2008,
Vol. 30, Issue 40
Configuresoft Compliance Checker is a utility that checks VMware ESX environments for compliance and produces reports for review or archival.
Helping Organizations Meet Compliance
- Global DataGuard Offers Security Suite & Services
May 23, 2008,
Vol. 30, Issue 21
Global DataGuard Enterprise is a unified threat management suite that helps organizations protect healthcare information.
Enhance Security Compliance & Policy
- Develop, Implement & Validate Security Policy
April 25, 2008,
Vol. 30, Issue 17
Experts agree that successful security compliance starts with knowing your risks and exposures.
Managing & Protecting Data In Virtual Environments
- Storage & Server Virtualization Have To Be Implemented In Tandem
October 12, 2007,
Vol. 29, Issue 41
IT managers must pay close attention to how they can manage, protect, and recover all the data that is moving through their virtual environments.
Streamlining The Data Center With Regulation Compliance
August 31, 2007,
Vol. 29, Issue 35
How does an SME wade through so many different types of laws and regulations to stay in compliance?
- CALEA: “Can Anyone Legitimately Explain This Act?”
March 16, 2007,
Vol. 29, Issue 11
With its March 12 deadline looming, CALEA, officially known as the Communications Assistance for Law Enforcement Act, is the latest legislative offspring to add its initials to a growing list of a compliance laws that IT executives must contend with.
E-discovery & The Data Center
- Eventually, It’s Bound To Be Part Of Your Job
March 2, 2007,
Vol. 29, Issue 9
To complete an electronic data discovery request, you may have to rummage through file servers, email servers, SANs, mirrors, archives, and backup tapes, not to mention hundreds or even thousands of endpoint hard drives.
Compliance Does Not Equal Security
- But Experts Reveal How A Tandem Effort Can Boost Both Areas
February 16, 2007,
Vol. 29, Issue 7
Strict adherence to regulatory compliance is a must in the post-Enron era, but when it comes to security, compliance can prove a wolf in sheep’s clothing.
- Anti-piracy Efforts Bring New Licensing Woes
January 26, 2007,
Vol. 29, Issue 4
Software licensing used to be fairly straightforward. But today’s vendors are adopting more complex license enforcement models aimed at curbing software piracy.
- Rising Security Threats Require Tougher Notification Laws, But At What Price?
September 8, 2006,
Vol. 28, Issue 36
Security threats are on the rise; one inevitable result is the legislation to combat them. Breach laws address the problem by requiring that a company notify customers when a theft occurs.
- How SMEs Can Choose The Right Vendor
June 30, 2006,
Vol. 28, Issue 26
Now that the initial surge of compliance audits has passed, vendors can no longer use the C-word to browbeat clients into purchasing products that may or may not satisfy the likes of Sarbanes-Oxley and HIPAA. So how does a company go about choosing a compliance vendor?
The Right Combination
- Reflex Security Helps Customers Achieve Compliance & Peace Of Mind
May 26, 2006,
Vol. 28, Issue 21
Reflex Security is doing a good job of beating the odds by delivering outstanding products at affordable prices.
to view the next 25 listings.
Click any of the letters below to view a listing of articles
with titles beginning with that letter:
This Week's Issue
Browse All Issues
Browse All Articles
Enter a word or phrase to search by:
ALL Words ('network' AND 'storage')
ANY Words ('network' OR 'storage')
Exact Match ('network storage'- all words MUST appear together)
Enter A Specific Date Range, If Desired:
Published On Or After (mm/yyyy):
Published On Or Before (mm/yyyy):
Paid subscribers to
Computer Power User
magazine have complete access to the entire Editorial archive of
of these publications. If you're not a subscriber and you'd like to get a sample of what you're missing,
to search through this incredible information resource and view partial article content.
Copyright & Legal Notice
Search results delivered by the Troika
Copyright © by Sandhills Publishing Company 2013. All rights reserved.