nCircle

Displaying 1-10 of 10 results

  • White Papers // Aug 2009

    CSO's Guide to Security and Compliance

    Security and compliance are the leading concerns of CSOs today. These can be difficult areas to navigate due to the increase in number and complexity of regulations, the constant changing threat environment and the economic pressure to reduce costs. IT teams need solutions that make security and compliance easier, more...

    Provided By nCircle

  • White Papers // Jun 2009

    Top 10 Tangible Measures for Effective Security Risk Management

    Visibility and measurement are the very heart of security risk management. Without them it would be impossible to identify, assess and mitigate risks. They are also the key to effective process management. Identifying appropriate metrics ideally requires a consideration of the organization's business goals, strategies and compliance requirements, and the...

    Provided By nCircle

  • Webcasts // Jan 2009

    Fearless e-Commerce: Implementing File Integrity Monitoring for Security and PCI Compliance

    The presenter of this webcast talks about ensuring the integrity of the payment network to increase customer confidence during online transactions with the business.

    Provided By nCircle

  • Webcasts // Jan 2009

    Operationalizing Risk Management: A Metrics-Based Approach to Comprehensive Risk Management

    The next generation of security best practices relies on a metrics-driven, risk-focused approach. The presenter will share the approach successfully implemented around the world by the US Agency for International Development (USAID). This approach is now a best practice - as USAID is the only Federal agency to earn a...

    Provided By nCircle

  • Webcasts // Jan 2009

    USAID Case Study: A Risk Management Approach to Security Compliance

    The United States Agency for International Development (USAID) provides economic and humanitarian assistance in more than 100 countries. USAID is the only Federal agency to receive an A+ in their Federal Information Security Management Act (FISMA) scoring for two consecutive years. nCircle is the foundation technology used to deliver these...

    Provided By nCircle

  • Webcasts // Jan 2009

    Deperimiterization - Building a Multi-Level Security Strategy to Prevent Infiltration

    With the continued trend toward out-sourcing, growing numbers of hand-held devices to corporate networks, and expansion of third-party business relationships, the traditional view of the network border as a "Hard shell" has been replaced by a porous, more permissive border. The presenter will discuss how IT security departments can manage...

    Provided By nCircle

  • Webcasts // Jan 2009

    Network Topology Analysis: The Most Effective Way to Prioritize Security Initiatives

    The rate of discovery of new vulnerabilities continues to increase, and security and operations teams simply do not have the resources to keep up. The attendee will learn how nCircle's new Topology Risk Analyzer prioritizes risk remediation using vulnerability and network topology-line of sight-risk, enabling IT staff to focus on...

    Provided By nCircle

  • Webcasts // Jan 2009

    Analyzing Your Network Security Risk With nCircle's Suite360 Intelligence Hub

    The attendee of this webcast will discover how to take advantage of IP360's open architecture to integrate the network intelligence gathered by IP360 and the existing systems and leverage that intelligence to measure, manage, and reduce network risk. The attendee will learn how nCircle's Security Intelligence Hub goes beyond simply...

    Provided By nCircle

  • White Papers // Nov 2008

    Automating HIPAA Compliance With Security and Configuration Auditing

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was designed to ensure that people who changed jobs or residences did not lose their health insurance. As the legislation was drafted, a rule was added to protect the privacy of individuals' personal health information - the Privacy Rule -...

    Provided By nCircle

  • Related Offers // Feb 2004

    Proactive Network Security Seminar 2004

    Announcing nCircle Proactive Security Seminars 2004, sponsored by nCircle and Cisco Systems. Security experts know that most network attacks are designed to exploit known vulnerabilities. So it's no surprise that the most effective security solutions identify and eliminate these vulnerabilities before an incident occurs. These FREE seminars will...

    Provided By nCircle

  • Related Offers // Feb 2004

    Proactive Network Security Seminar 2004

    Announcing nCircle Proactive Security Seminars 2004, sponsored by nCircle and Cisco Systems. Security experts know that most network attacks are designed to exploit known vulnerabilities. So it's no surprise that the most effective security solutions identify and eliminate these vulnerabilities before an incident occurs. These FREE seminars will...

    Provided By nCircle

  • White Papers // Aug 2009

    CSO's Guide to Security and Compliance

    Security and compliance are the leading concerns of CSOs today. These can be difficult areas to navigate due to the increase in number and complexity of regulations, the constant changing threat environment and the economic pressure to reduce costs. IT teams need solutions that make security and compliance easier, more...

    Provided By nCircle

  • White Papers // Nov 2008

    Automating HIPAA Compliance With Security and Configuration Auditing

    The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was designed to ensure that people who changed jobs or residences did not lose their health insurance. As the legislation was drafted, a rule was added to protect the privacy of individuals' personal health information - the Privacy Rule -...

    Provided By nCircle

  • White Papers // Jun 2009

    Top 10 Tangible Measures for Effective Security Risk Management

    Visibility and measurement are the very heart of security risk management. Without them it would be impossible to identify, assess and mitigate risks. They are also the key to effective process management. Identifying appropriate metrics ideally requires a consideration of the organization's business goals, strategies and compliance requirements, and the...

    Provided By nCircle

  • Webcasts // Jan 2009

    Fearless e-Commerce: Implementing File Integrity Monitoring for Security and PCI Compliance

    The presenter of this webcast talks about ensuring the integrity of the payment network to increase customer confidence during online transactions with the business.

    Provided By nCircle

  • Webcasts // Jan 2009

    Operationalizing Risk Management: A Metrics-Based Approach to Comprehensive Risk Management

    The next generation of security best practices relies on a metrics-driven, risk-focused approach. The presenter will share the approach successfully implemented around the world by the US Agency for International Development (USAID). This approach is now a best practice - as USAID is the only Federal agency to earn a...

    Provided By nCircle

  • Webcasts // Jan 2009

    USAID Case Study: A Risk Management Approach to Security Compliance

    The United States Agency for International Development (USAID) provides economic and humanitarian assistance in more than 100 countries. USAID is the only Federal agency to receive an A+ in their Federal Information Security Management Act (FISMA) scoring for two consecutive years. nCircle is the foundation technology used to deliver these...

    Provided By nCircle

  • Webcasts // Jan 2009

    Deperimiterization - Building a Multi-Level Security Strategy to Prevent Infiltration

    With the continued trend toward out-sourcing, growing numbers of hand-held devices to corporate networks, and expansion of third-party business relationships, the traditional view of the network border as a "Hard shell" has been replaced by a porous, more permissive border. The presenter will discuss how IT security departments can manage...

    Provided By nCircle

  • Webcasts // Jan 2009

    Network Topology Analysis: The Most Effective Way to Prioritize Security Initiatives

    The rate of discovery of new vulnerabilities continues to increase, and security and operations teams simply do not have the resources to keep up. The attendee will learn how nCircle's new Topology Risk Analyzer prioritizes risk remediation using vulnerability and network topology-line of sight-risk, enabling IT staff to focus on...

    Provided By nCircle

  • Webcasts // Jan 2009

    Analyzing Your Network Security Risk With nCircle's Suite360 Intelligence Hub

    The attendee of this webcast will discover how to take advantage of IP360's open architecture to integrate the network intelligence gathered by IP360 and the existing systems and leverage that intelligence to measure, manage, and reduce network risk. The attendee will learn how nCircle's Security Intelligence Hub goes beyond simply...

    Provided By nCircle