Category Archives: Compliance

Fixing the Top 5 Compliance and Security Challenges in Hospitality

Best practices for hotels, restaurants and retail businesses. The number one technology issue faced by hospitality businesses today – including hotels, restaurants and retail stores — is compliance with the Payment Card Industry Data Security Standards (PCI DSS). This paper focuses on the top five compliance and security challenges hospitality […]

Read More

Get Started with GLBA and FFIEC Compliance

How to build effective risk assessment processes in banks and credit unions. The GLBA, and the FFIEC guidelines that support its enforcement, continue to evolve and change, challenging community banks, regional banks and credit unions when it comes to conformance.This on-demand webcast will help IT professionals in banks and credit […]

Read More

Meeting Data Residency and Compliance Challenges in Global Enterprises

This paper examines information privacy and data residency solutions that can help multinational businesses meet their data protection goals. This paper focuses on U.S. interstate and federal regulations, and European Union requirements as they apply both in the EU as well as in other jurisdictions, where regulations such as the […]

Read More

Beyond Compliance: Combating Threats with Endpoint Configuration Management

The evolution of threats and the accelerating arms-race between organizations and attackers has caused endpoint security to re-emerge as a critical security issue. Configuration management is the foundation of endpoint security. Read this white paper by Randy Franklin Smith of Monterey Technology Group to find out how to fill the […]

Read More

PCI DSS Compliance for Restaurants

Learn about a PCI security and compliance solution that can help your restaurant become hack-proof. Restaurants have become targets for hackers looking to steal payment card information. Most restaurant owners fail to realize the inherent risks and liabilities associated with processing, transmitting and storing financial data, and continue to keep […]

Read More

PCI Compliance & Security in a Franchise Model

This white paper explores the dangers posed by non-compliance with Payment Card Industry Data Security Standard (PCI DSS) requirements in a franchise environment, and how data security is extremely important throughout the franchise network for maintaining customer trust and loyalty, and protecting the brand image. If there’s a transaction that […]

Read More

Ensuring PCI Compliance with Identity and Access Management

Learn from an industry expert how to comply with the Payment Card Industry Data Security Standard (PCI DSS) and protect consumers’ data. View this informative on-demand webinar featuring Courion customer Sundiata Alaye of SiriusXM Radio and industry expert Davi Ottenheimer as they discuss how organizations must demonstrate compliance with the […]

Read More

IDC Spotlight: Access Control and Certification

Read this brief for best practices on managing user access compliance. Ensuring user access is compliant with policy and regulatory requirements is critical to managing IT security and demonstrating audit compliance. This brief by IDC discusses best practices and solutions for addressing these challenges. Courion Corporation Please fill the below […]

Read More

Best Practices for Access Certification

Is your company using best practices to certify user access is in accordance with policy? The automation of access certification is one of the surest ways to demonstrate user access is compliant with policy and regulatory requirements. Learn how Courion solutions can help your organization streamline the access certification process […]

Read More

Ensuring HIPAA and HITECH Compliance with Identity and Access Management

View this on-demand webinar to learn how leading healthcare organizations are dealing with industry compliance requirements for personal health information. The Healthcare Information Portability and Accessibility Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) have added layers of complexity and cost to all healthcare […]

Read More

Best Practices in SOX Compliance

It is mandatory for public companies across the US to comply with the provisions of the SOX Act. Organizations may face financial penalties as well as reputational hassles in case of failure to comply, which can, in turn, lead to inefficient processes and controls within non-complying organizations. Experts believe that […]

Read More

Address Privacy Compliance by Tracking Personally Identifiable Information

Do you know where your sensitive information is? Since 2005 over 1 million records have been exposed outside of corporate networks. In a free white paper, learn how you can address this growing threat. The amount of personally identifiable information (PII) available in the enterprise continues to grow exponentially. Credit […]

Read More

Achieving Enormous Efficiencies in Policy and Compliance Management

Learn how The First American Corporation centralizes their approach to policy and compliance management with Archer Technologies solutions. For many years, The First American Corporation used a variety of applications, spreadsheets and documents to manage policy and compliance processes across their five major business segments. While their processes were effective, […]

Read More

Achieving Configuration Compliance in a Regulatory Framework

Find out how to achieve automated configuration compliance with an appliance that delivers comprehensive assistance. Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. SafeWord® […]

Read More

Profiting through Software Intelligence: A Layered Approach to License Compliance

Profiting through Software Intelligence:  A Layered Approach to License Compliance Since the emergence of the commercial software industry, software vendors have struggled to overcome piracy. Software theft has cost developers billions of dollars, sometimes making the difference between sustainable profit and unsustainable loss.To protect their intellectual property, software vendors have […]

Read More

The 5 Steps to Social Media Compliance

What You Need to Know Before You Go Social. As social media marketing continues to grow, nearly two-thirds of the Fortune 500 is actively engaging customers, partners, and prospects on YouTube (69%), Facebook (70%), and Twitter (77%) and the use of Social Relationship Platforms to expedite this engagement is increasing. […]

Read More