Financial Compliance Reports

PCI DSS: Next-Generation Data Security, Storage and Integrity
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

TechTarget Security

Case Study: Customer and Channel Insight Shapes Business Decisions
sponsored by Aria
CASE STUDY: This brief case study reveals how the right billing system enabled communications provider IMN to meet the needs of sales growth by supporting enterprise-wide billing and customer management.
Posted: 21 Nov 2013 | Published: 31 Dec 2012

Aria

E-Guide: Risk Management and Compliance Enforcement for the Financial Industry
sponsored by IBM
EGUIDE: This e-guide discusses how the appropriate risk management tactics are imperative for organizations, and how companies should pay close attention to agent risk and waste no time in making it part of their risk management models.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Business Management in the Age of Enterprise 2.0
sponsored by Oracle Corporation
WHITE PAPER: In this analysis, Frank Buytendijk examines what information management means, and describes a complete spectrum of business cases, ranging from tactical cost reduction to transformational impact on the organization’s business model.
Posted: 03 Feb 2010 | Published: 01 Dec 2008

Oracle Corporation

Information security and compliance services overview
sponsored by DellEMC and Intel®
WHITE PAPER: With new threats emerging and the pressures the meet compliance, your organization is forced to focus more on security and less on strategic projects that drive your business. Access this paper for an overview of security and compliance solutions available to help handle your security issues, freeing your time to focus on growing your business.
Posted: 18 May 2011 | Published: 18 May 2011

DellEMC and Intel®

The Future of Address Validation: Going Beyond Move Update to Cut Costs and Connect with Customers
sponsored by Pitney Bowes Business Insight
WHITE PAPER: Today, the need to connect with customers efficiently and effectively is more important than ever. The foundation of these communications is a complete and accurate customer record. This paper describes the validation requirements, opportunities and best practices to increase organizational efficiencies relative to enterprise address validation.
Posted: 13 Sep 2010 | Published: 13 Sep 2010

Pitney Bowes Business Insight

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

5 Steps to Implement & Maintain PCI DSS Compliance
sponsored by AT&T Cybersecurity
WHITE PAPER: Achieving and maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be difficult. Explore this white paper to uncover 5 steps to take to make the compliance process easy and secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AT&T Cybersecurity

Case Study: Fortune 100 Insurance Company and Security Weaver
sponsored by Security Weaver
CASE STUDY: For the VP of Financial Systems for a Fortune 100 Insurance Company, the decision to implement an SAP compliance and reporting solution was initiated as a result of SOX. Now that the Security Weaver solution has been in place for about two years, the VP is convinced that the decision to go with this solution was the best choice for his company.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Security Weaver