Financial IT Reg Enforcement Service: Using FFIEC Security Best Practices to Ensure Laptops and PCs are Secure and Compliant

Lawmakers and auditors have begun to require extensive safeguards for personal data residing on laptops, distributed personal computers, and handheld devices. They are also mandating protections for data being transferred to and from mobile employees over wireless connections and public networks. This white paper discusses the ensuing challenges faced by financial institutions and describes some of the tools that exist to prove compliance.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Comparing the Total Cost of Ownership of Business Intelligence Solutions

For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions.
  • Written By:
  • Published On:

Troubleshooting Remote Site Networks—Best Practices

Management and remote site employees expect the same level of network service as the headquarters site. However, when IT staff are faced with limited resources to support remote site networks, often the applications, services and performance at those sites are not as robust as the headquarters site. See how to deliver a high level of network service at remote sites using best practices outlined in this white paper.
  • Written By:
  • Published On:

Go Daddy: Best Practices on Validating Storage Performance

Learn how Go Daddy accelerated new storage technology adoption, decreased risk by ensuring SLAs, and reduced costs by 50% for its 30 PBs of hosting data. The new storage validation process empowers Go Daddy with the insight to optimize both service delivery and vendor selection.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Are Your Company Laptops Truly Secure?

The portable nature of laptops makes them particularly susceptible to all kinds of security and tracking problems. This paper discusses the strengths and limitations of laptop security, including the technology for accurately tracking IT assets, recovering missing computers, and deleting data remotely.
  • Written By:
  • Published On:

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware

Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.
  • Written By:
  • Published On:

Identity-based Policy Enforcement: A LAN Security Best Practices Whitepaper

Disappearing network perimeters highlight the need for identity-based security. Open networks, mobile systems, and unmanaged endpoints have become overwhelming obstacles—and cash drains. However, enforced identity-based policies within identity-blind systems have proven futile. Is there a solution? Yes. Make your policy enforcement layer identity-aware—build user identity knowledge directly into your network fabric.
  • Written By:
  • Published On: