Vulnerability Management for GLBA Compliance

The security provisions of the US Gramm-Leach-Bliley Act (GLBA) are complex and process-intensive, and non-compliant financial institutions and their officers have suffered penalties as a result. With QualysGuard’s vulnerability management and policy compliance solution—including on-demand auditing capabilities—financial institutions can easily meet the key security guidelines that are detailed in the GLBA.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

How Offshore Drilling Companies Realize ROI on an EAM Software Investment

Rig owners and operators today have an increased focus on asset integrity management (AIM) and risk management, and are reassessing their investments in enterprise asset management (EAM) software to ensure they have applications in place that are properly implemented and functional, ensure compliance with regulations, and adopt AIM best practices. This white paper discusses the EAM software features that can play a role in software project ROI for drilling contractors as well as specific, discrete steps to take during implementation.
  • Written By:
  • Published On:

Customer Compliance Demands: Beast of Burden, or New Business Opportunity

Today, compliance pains come from three sources: government, large industrial or retail customers, and even smaller customers who are asking for unique delivery, packaging, assembly or other services. This white paper presents "compliance" as an enormous opportunity for the small to medium size business owner. Read it and understand the compliance demands within the distribution environment and how they affect your business.
  • Written By:
  • Published On:

Tax Compliance and the ERP System: Eliminate Error and Ensure End-to-end Compliance

A properly deployed ERP system handles tax compliance with accuracy and reliability, offering flexibility and functionality as your business grows. Learn more in this white paper about tax compliance in ERP systems and how automating tax management can save your organization time, energy, and money in the long run.
  • Written By:
  • Published On:

You may also be interested in these related documents:

The Need for Vulnerability Management

New network vulnerabilities appear every day due to flaws in software, faulty configuration, and human error. Detecting, removing, and controlling vulnerabilities requires vulnerability management (VM)—the continuous use of software tools to purge exploitable risks. Find out how making VM a part of your network security strategy can help you counter sophisticated exploits and document compliance with security standards.
  • Written By:
  • Published On:

Making Gramm-Leach-Bliley Security Compliance Fast and Easy

Designed to improve consumer financial services, the Gramm-Leach-Bliley Act (GLBA) includes security provisions for protecting confidential electronic financial information. For the approximately 9,500 financial institutions affected, compliance can be complex and process-intensive. Learn about network security auditing and vulnerability management solutions that can make GLBA compliance faster and more cost-effective.
  • Written By:
  • Published On:

Integrating Vulnerability Assessment and Remediation: Guidelines to Maximize Performance and Benefits

Over the past few years, vulnerabilities have exploded across all types of platforms—leaving IT security and operations teams scratching their heads. Today, many companies use the scan-and-patch method for managing vulnerabilities—a reactive security process that should be avoided. By combining assessment and remediation, companies create a vulnerability management program that can rapidly respond to emerging threats.
  • Written By:
  • Published On: