Federal Information Security ClaimsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Federal Information Security Claims returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Storage Security
 •   Enterprise Information Integration/ Metadata Management
 •   Business Intelligence Solutions
 •   Vulnerability Assessment

Related Searches
 •   Federal Collection
 •   Federal Information Security Tutorial
 •   Federal Reporting
 •   Federal Vendor
 •   Impact Federal
 •   Requirement Federal
 •   Source Federal Information Security
 •   Systems Federal
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 27, 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

Continuous monitoring, remediation and CyberScope reporting by IBM

December 31, 2011 - (Free Research)
This white paper explores an automated tool that can help government agencies gain and maintain key security compliance with the Federal Information Security Management Act (FISMA). 
(WHITE PAPER) READ ABSTRACT |

FISMA Compliance: A Holistic Approach to FISMA and Information Security by IBM

January 10, 2011 - (Free Research)
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates. 
(WHITE PAPER) READ ABSTRACT |

Cybersecurity Threats: Managing Enterprise Risk and Ensuring Regulatory Compliance by Silver Tail Systems

February 22, 2011 - (Free Research)
This e-guide discusses the NERC compliance security threats, better cybersecurity through risk management, and what enterprise security administrators can do to defend themselves against such attacks. 
(EGUIDE) READ ABSTRACT |

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation by Tripwire, Inc.

August 03, 2010 - (Free Research)
Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Deliver Effective Governance for Identity and Access Management by IBM

June 11, 2009 - (Free Research)
Organizations should consider a thorough approach to IAM governance that meets the requirements of discovering, documenting and analyzing user access; establishing a process for user access governance; ensuring that constraints help manage business conflict; enforcing policies; and continuous monitoring. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Enterprise UTM Security: The Best Threat Management Solution? by NETGEAR Inc.

December 10, 2010 - (Free Research)
If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise. 
(EGUIDE) READ ABSTRACT |

Core IMPACT Essential by Core Security Technologies

January 06, 2009 - (Free Research)
How do you keep up with remediation efforts and strengthen your defenses against round-the-clock threats while still having time to do your day job? CORE IMPACT Essential can help. 
(PRODUCT DEMO) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 18, 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

The CISO's Guide to Virtualization Security by Rapid7

January 12, 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

Using Data Mining to Detect Insurance Fraud by IBM

November 18, 2010 - (Free Research)
Insurers lose millions each year through fraudulent claims. This paper explains how leading insurance companies are using data mining techniques to find fraudulent claims. Read on to learn how to combine powerful analytics with your existing fraud detection and prevention efforts. 
(WHITE PAPER) READ ABSTRACT |

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension

May 28, 2009 - (Free Research)
The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Getting Started With Email Archiving for Exchange - The Exchange 2010 Edition by Sherpa Software

March 30, 2011 - (Free Research)
This white paper discusses the reasons email archiving is necessary, the benefits of archiving messages, the different options available for archiving, and how administrators can determine which option is best for a given company. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye

February 2014 - (Free Research)
This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools. 
(WHITE PAPER) READ ABSTRACT |

Quality Assurance Throughout the Clinical Documentation Workflow by Nuance

December 2011 - (Free Research)
How can you successfully manage the clinical documentation creation process in order to maximize quality while also containing costs and ensuring patient confidentiality? This resource introduces a tool that enables you to do just that. Read on to learn more now. 
(WHITE PAPER) READ ABSTRACT |

 Achieving Measurable Gains by Automating Claims Processing by Kofax, Inc.

March 2010 - (Free Research)
This white paper identifies seven levels of claims automation and provides a roadmap that can be followed to enhance claims processing for insurance companies worldwide. 
(WHITE PAPER) READ ABSTRACT |

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies by Embarcadero Technologies, Inc.

March 2009 - (Free Research)
Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies. 
(WHITE PAPER) READ ABSTRACT |

Protect Profit Margins with Automated Chargeback Management by SAP America, Inc.

June 2012 - (Free Research)
This paper outlines how wholesale distributors can vastly improve their profit margins by accurately tracking and filing chargeback claims with various manufacturers. Read on to learn how deploying an automated chargeback management solution can help you save money and reduce supplier inefficiencies. 
(EBOOK) READ ABSTRACT |

Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Reporting by SAP

November 2009 - (Free Research)
This paper explores the reporting challenges faced by organizations and examines the many benefits of automated U.S. American Recovery and Reinvestment Act (ARRA) reporting systems. 
(WHITE PAPER) READ ABSTRACT |

E-Book: IT in the Electronic Hospital by Imprivata

February 2010 - (Free Research)
The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more. 
(EBOOK) READ ABSTRACT |

eBook: IT in the Electronic Hospital by SearchCIO.com and SearchSecurity.com

October 2009 - (Free Research)
The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more. 
(EBOOK) READ ABSTRACT |

Presentation Transcript: Pragmatic Data Security by Websense, Inc.

March 2010 - (Free Research)
This presentation transcript busts through hype, hyperbole, and complexity and details a pragmatic approach to information-centric security for nearly any organization. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts