Home
 > Research and Reports > White Papers > Compliance and Privileged Password Management

Compliance and Privileged Password Management

Source: e-DMZ Security
Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help.


Featured publications:

Asset Management with the British Standards Institute's PAS 55
Source: Infor In this white paper, Kevin Price, Senior Product Manager, Infor EAM, looks at how the British Standards Institute’s (BSI) PAS 55 is helping organizations across the world to improve risk management, compliance and customer satisfaction in asset management. Read More...
Learning in the Cloud for Regulated Industries
Source: SuccessFactors Does a multitenant SaaS learning management system (LMS) have a role in a compliance-driven, highly regulated work environment? Organizations in regulated industries, such as life sciences, struggle with adopting SaaS learning solutions due to the need to comply with a range of good practice requirements. This paper explains how regulated companies can address these compliance challenges and deliver a validated environment with a multitenant SaaS LMS. Read More...
Sales Tax Compliance and the CFO: What automation means for risk management
Source: Avalara It’s time C-level executives take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance. Read More...


You may also be interested in these related documents:

Privileged User Management
Source: Quocirca Ltd IT managers feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. But they tend to overlook one particular area of IT security—the privileged access that they grant themselves or their colleagues in order to do their jobs. Learn how to make sure your IT systems are not impacted by the inadvertent or malicious actions of privileged users. Read More...
Achieving PCI Compliance for Privileged Password Management and Remote Vendor Access
Source: e-DMZ Security Noncompliance with Payment Card Industry (PCI) standards can have a devastating effect on any company that relies on credit card transactions. Contractual penalties and revocation of your rights to process credit card transactions are just two potential repercussions. Though there is no single solution for PCI compliance, you can minimize the risks by staying on top of the latest products and procedures. Learn more. Read More...
Privileged User Monitoring for SOX Compliance
Source: Tizor Many companies face the Sarbanes-Oxley (SOX) compliance challenge of monitoring all the data activity of their most privileged users. Those challenges include tracking access to sensitive financial data, reporting on controls, and responding to problems. Learn about a database auditing and protection solution that can help capture targeted activities, without impacting the performance of production databases and software. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.