IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

VoltageUse Case Brief: Ensuring Privacy for PII and PHI in Regulated Industries

Competing encryption offerings we looked at would have required us to hire three or four dedicated administrators to keep everything running smoothly. Voltage SecureMail can be managed with our regular email administrative staff, saving us a lot of time and money.

Read more...
 
E-mail

White PaperTop 5 Questions for a CISO

Thankfully, most organizations now have a Chief Information Security Officer. The CISO's primary function is to stand in the gap between the business and all the IT related risks that surround the modern-day organization. He or she may have a staff of trained security professionals, or perhaps your leader has engaged third party service providers for many of the necessary controls. Regardless, the CISO is the where 'the buck stops' when it comes to IT risk management.

Read more...
 
E-mail

www.TRUSTe.comTRUSTe 2014 US Consumer Confidence Privacy Report

As part of our commitment to helping companies to safely collect and use consumer data to power their businesses, we wanted to get behind the headlines and find out what effect the events of 2013 have had on consumer privacy concerns and provide an accurate picture of the potential impact this could have on businesses in the year ahead.

Read more...
 
E-mail

www.metricstream.comCase Study: A Leading Financial Services Organization Enables a Fully Unified, Streamlined, and Consistent Process for Threat and Vulnerability Management

Overview: As business operations scale up and become increasingly dependent on Information Technology (IT), IT environments will continue to become more complex, exposing organizations to a wide array of risks, threats, and vulnerabilities that have a direct impact on the performance of the enterprise.

Read more...
 
E-mail

www.voltage.comVoltage Customer Success Story - Regional Air Carrier

A growing regional air carrier needed a way to protect its customer data and achieve compliance at both level-1 and level-2 classifications. The Voltage Security solution combines the following technologies to deliver a simple and cost-effective solution across the entire company: Voltage Secure Stateless Tokenization (SST) technology, Voltage Format-Preserving Encryption (FPE), and Voltage Page-Integrated Encryption (PIE).

Read more...
 
E-mail

VoltageMeeting Data Residency and Compliance Challenges in Global Enterprises

In today's global business environment, companies are increasingly finding their employees, business practices, and IT systems stretched across international boundaries. However, one element of a global enterprise remains surprisingly local: how to effectively manage data residency requirements and data privacy regulations.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »
Page 1 of 12

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner
Banner