Vulnerability Management for GLBA Compliance

  • Source: Qualys
  • Written By:
  • Published:
  • (Originally Published On:) )
The security provisions of the US Gramm-Leach-Bliley Act (GLBA) are complex and process-intensive, and non-compliant financial institutions and their officers have suffered penalties as a result. With QualysGuard’s vulnerability management and policy compliance solution—including on-demand auditing capabilities—financial institutions can easily meet the key security guidelines that are detailed in the GLBA.

Featured Software Research:

Asset Management with the British Standards Institute's PAS 55

  • Source: Infor
  • Written By:
  • Published:
In this white paper, Kevin Price, Senior Product Manager, Infor EAM, looks at how the British Standards Institute’s (BSI) PAS 55 is helping organizations across the world to improve risk management, compliance and customer satisfaction in asset management. Read More

2015 Travel and Expense Management Report: Increasing Control, Compliance, and Productivity in a Modern Mobile Workforce

Travel is a crucial business expenditure for many enterprises, with organizations looking to balance travel needs with cost-effectiveness. Travel expense management needs to consider accuracy, compliance, cost-productivity, and results. Financial process automation can be key to managing those factors.

Financial process automation is becoming more important for corporate travel expense management, as is accessing that automation while on the go. Travel and expense management (TEM) software,... Read More

Delphix for Amazon Web Services

Cloud deployments are becoming essential to most businesses, but they also include challenges like cost, compliance, and agility. This document from Delphix looks at the company’s deployment platform, which enables organizations to achieve compliance and data management agility while lowering costs. Read More

You may also be interested in these related documents:

The Need for Vulnerability Management

New network vulnerabilities appear every day due to flaws in software, faulty configuration, and human error. Detecting, removing, and controlling vulnerabilities requires vulnerability management (VM)—the continuous use of software tools to purge exploitable risks. Find out how making VM a part of your network security strategy can help you counter sophisticated exploits and document compliance with security standards. Read More

Making Gramm-Leach-Bliley Security Compliance Fast and Easy

Designed to improve consumer financial services, the Gramm-Leach-Bliley Act (GLBA) includes security provisions for protecting confidential electronic financial information. For the approximately 9,500 financial institutions affected, compliance can be complex and process-intensive. Learn about network security auditing and vulnerability management solutions that can make GLBA compliance faster and more cost-effective. Read More

Integrating Vulnerability Assessment and Remediation: Guidelines to Maximize Performance and Benefits

Over the past few years, vulnerabilities have exploded across all types of platforms—leaving IT security and operations teams scratching their heads. Today, many companies use the scan-and-patch method for managing vulnerabilities—a reactive security process that should be avoided. By combining assessment and remediation, companies create a vulnerability management program that can rapidly respond to emerging threats. Read More
 
comments powered by Disqus