Home
 > Research and Reports > White Papers > Vulnerability Management for GLBA Compliance

Vulnerability Management for GLBA Compliance

Source: Qualys
The security provisions of the US Gramm-Leach-Bliley Act (GLBA) are complex and process-intensive, and non-compliant financial institutions and their officers have suffered penalties as a result. With QualysGuard’s vulnerability management and policy compliance solution—including on-demand auditing capabilities—financial institutions can easily meet the key security guidelines that are detailed in the GLBA.


Featured publications:

Asset Management with the British Standards Institute's PAS 55
Source: Infor In this white paper, Kevin Price, Senior Product Manager, Infor EAM, looks at how the British Standards Institute’s (BSI) PAS 55 is helping organizations across the world to improve risk management, compliance and customer satisfaction in asset management. Read More...
Learning in the Cloud for Regulated Industries
Source: SuccessFactors Does a multitenant SaaS learning management system (LMS) have a role in a compliance-driven, highly regulated work environment? Organizations in regulated industries, such as life sciences, struggle with adopting SaaS learning solutions due to the need to comply with a range of good practice requirements. This paper explains how regulated companies can address these compliance challenges and deliver a validated environment with a multitenant SaaS LMS. Read More...
Sales Tax Compliance and the CFO: What automation means for risk management
Source: Avalara It’s time C-level executives take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance. Read More...


You may also be interested in these related documents:

The Need for Vulnerability Management
Source: Qualys New network vulnerabilities appear every day due to flaws in software, faulty configuration, and human error. Detecting, removing, and controlling vulnerabilities requires vulnerability management (VM)—the continuous use of software tools to purge exploitable risks. Find out how making VM a part of your network security strategy can help you counter sophisticated exploits and document compliance with security standards. Read More...
Making Gramm-Leach-Bliley Security Compliance Fast and Easy
Source: Qualys Designed to improve consumer financial services, the Gramm-Leach-Bliley Act (GLBA) includes security provisions for protecting confidential electronic financial information. For the approximately 9,500 financial institutions affected, compliance can be complex and process-intensive. Learn about network security auditing and vulnerability management solutions that can make GLBA compliance faster and more cost-effective. Read More...
Integrating Vulnerability Assessment and Remediation: Guidelines to Maximize Performance and Benefits
Source: SecureWave Over the past few years, vulnerabilities have exploded across all types of platforms—leaving IT security and operations teams scratching their heads. Today, many companies use the scan-and-patch method for managing vulnerabilities—a reactive security process that should be avoided. By combining assessment and remediation, companies create a vulnerability management program that can rapidly respond to emerging threats. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.