IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!

www.metricstream.comSolution Brief: MetricStream Vendor Risk Management

Enabling a streamlined, automated, and collaborative approach to vendor risk management with MetricStream.

Introduction: Corporations often depend on hundreds of vendors to fulfill their business processes. Single sourcing puts institutions at risk by making them too dependent on one vendor. On the other hand, multiple sourcing dilutes vendor accountability, and makes vendor collaboration and coordination much more challenging.

Read more...
 

www.metricstream.comIT Risk Is Not About IT – It's About the Business

Introduction: Information technology risk teams know well that the scope of IT risks can be very broad – ranging from technical security risk, to IT operations risk, through to operational risk and enterprise risk.

Read more...
 

www.voltage.comVoltage Secure Stateless Tokenization (SST) Technology Data Sheet

Enterprises, merchants and payment processors face severe, ongoing challenges securing their networks and high value sensitive data such as payment cardholder data, to comply with the Payment Card Industry Data Security Standard (PCI DSS) and data privacy laws. Voltage SST Technology Delivers Advanced Protection for Sensitive Corporate Data.

Read more...
 

www.metricstream.comCase Study: A Leading Financial Services Organization Enables a Fully Unified, Streamlined, and Consistent Process for Threat and Vulnerability Management

Overview: As business operations scale up and become increasingly dependent on Information Technology (IT), IT environments will continue to become more complex, exposing organizations to a wide array of risks, threats, and vulnerabilities that have a direct impact on the performance of the enterprise.

Read more...
 

www.voltage.comVoltage Customer Success Story - Regional Air Carrier

A growing regional air carrier needed a way to protect its customer data and achieve compliance at both level-1 and level-2 classifications. The Voltage Security solution combines the following technologies to deliver a simple and cost-effective solution across the entire company: Voltage Secure Stateless Tokenization (SST) technology, Voltage Format-Preserving Encryption (FPE), and Voltage Page-Integrated Encryption (PIE).

Read more...
 

VoltageMeeting Data Residency and Compliance Challenges in Global Enterprises

In today's global business environment, companies are increasingly finding their employees, business practices, and IT systems stretched across international boundaries. However, one element of a global enterprise remains surprisingly local: how to effectively manage data residency requirements and data privacy regulations.

Read more...
 

VoltageAchieving PCI DSS 2.0 Compliance with Voltage Security

The Payment Card Industry (PCI) Data Security Standard (DSS) 2.01 dictates that organizations processing and storing credit card data just comply with a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with PCI DSS 2.0 can be expensive, challenging, time-consuming, and disruptive, as cardholder data is often stored, transmitted, and used in many different applications within an organization, sometimes even beyond the organization's IT firewalls.

Read more...
 

CatbirdCatbird vSecurity

Catbird vSecurity is an integrated network security solution purpose-built for virtualized infrastructure with continuous monitoring, automated enforcement, and real-time proof of compliance capabilities that accelerate virtualization and dramatically increase operational efficiencies.

Read more...
 

CatbirdCatbird VMware Forsythe PCI DSS Solution Guide

As a member of the VMware Partner Network, Catbird published this addendum to the VMware Solution Guide for PCI DSS. Forsythe, a QSA, has confirmed that Catbird control elements are in line with PCI Guidance. Catbird vSecurity enables continuous policy monitoring and automated enforcement for the PCI DSS framework.

Read more...
 

CatbirdPCI Compliance and Virtual Asset Management

Co-sponsored by Catbird and VigiTrust, this paper addresses overcoming the challenges of scoping for Cardholder Data, including scope management, assessment preparation, continuous compliance considerations, operation impacts and do's and don'ts of virtualization security.

Read more...
 

Online TechDisaster Recovery

Investing in risk management means investing in business sustainability – designing a comprehensive business continuity and disaster recovery plan is about analyzing the impact of a business interruption on revenue.

Read more...
 

Voltage SecurityStreamlining Information Protection Through a Data-centric Security Approach

This document introduces a unique approach from Voltage Security that combines data encryption and masking technology in one, which can vastly simplify data privacy, whilemitigating data leakage at a fraction of the cost of prior approaches. One fundamental technology is Voltage Security's Format-Preserving Encryption (FPE), which for the first time, allows encryption 'in place' in databases and applications, without significant IT impact.

Read more...
 

Voltage SecurityEnd-to-end Data Protection for the Way Your Business Works

Voltage SecureData Enterprise brings a unique, proven data-centric approach to protection – where the access policy travels with the data itself – by permitting data encryption and tokenization without changes to data format or integrity, and eliminating the cost and complexity of issuing and managing certificates and symmetric keys.

Read more...
 

Voltage SecurityAchieving PCI Compliance at Greatly Reduced Cost

The global financial services company has a major credit card processing business. Like other credit card companies, it is imperative that they comply fully with the PCI DSS standards and procedures. Before Voltage Security, they were engaged in a security and compliance program costing tens of millions of dollars.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »
Page 1 of 22

  Most Popular | All