Home Submit URL Add to Favorite Contact
           19 April, 2024
 
    

Cjis Security Policy Compliance Strategy

Go to 1 2 3 Next >> page 
Secoda Risk Management (Popularity: )
http://www.secoda.com
RuleSafe from Secoda enables the people in your organisation to achieve real awareness of policies. Expert content and compliance tracking help organisations implement security (BS7799), privacy and regulatory requirements.
Category:   Computers - Security - Policy - Companies

Megaprime (Popularity: )
http://www.megaprime.com.au
Offers ISO/IEC 17799 compliant information security policy and management systems, security architectures, secure applications and networks.
Category:   Computers - Security - Policy - Companies

Security Assessments International (SAI) (Popularity: )
http://www.saione.com/
Assists healthcare facilities identify organizational strengths and weaknesses in physical protection and security practices; consulting services include analysis of existing protocols, policies, and procedures and development of recommendations to improve ...
Category:   Business - Healthcare - Consulting - S

Advent Information Management Ltd (Popularity: )
http://www.advent-im.co.uk
Product independant, knowledge based consultancy offering objective, unbiased information security management advice, training and consultancy. BS7799, Data Protection, Cyberliability, Security Policy design and implementation, Risk Management, Gap Analysis ...
Category:   Computers - Security - Policy - Companies

Citicus ONE - security risk management (Popularity: )
http://www.citicus.com
Citicus provides tools for information risk management to ensure that compliance with security policy can be monitored and enhanced.
Category:   Computers - Security - Policy - Companies

Related: Security Compliance - Security Policy - Corporate Security Policy - National Security Policy - Security Strategy


Health Care Compliance Strategies (hccs) - Compliance and HIPAA Training (Popularity: )
http://www.hccs.com
Provides multimedia compliance and HIPAA computer-based training courseware for healthcare organizations.
Category:   Health - Medicine - Education - Continuing Medical Education

National Defense University (Popularity: )
http://www.ndu.edu/
Seeks to ensure excellence in professional military education and research in the essential elements of national security. Includes the National War College, Information Resources Management College, Industrial College of the Armed Forces, Joint Forces ...
Category:   Reference - Education - Colleges and Universities - North America

Paragon Technical Services (Popularity: )
http://paragon-sw.com
Provides customized security, environmental and emergency management inspection and oversight services to private and governmental clients.
Category:   Business - Business Services - Security - Emergency Management

Damicon (Popularity: )
http://www.damicon.com
IT disaster response plans, network security audits and technical documentation for mid-sized companies in business-to-business and industrial markets.
Category:   Business - Business Services - Security - Emergency Management

National Defense University (Popularity: )
http://www.ndu.edu/
US Military post graduate education.
Category:   Business - Business Services - Security - National Security

Health Policy and Strategy Associates (Popularity: )
http://www.healthpol.com/
A policy and market place consulting firm specializing in assisting its clients through health policy and market change within the USA.
Category:   Business - Financial Services - Insurance - Life and Health

HIPAA Summit (Popularity: )
http://www.hipaasummit.com
This summit covers privacy, data security, compliance, confidentiality, privacy, Gramm-Leach-Bliley, and transaction and code sets. Designed for providers, legislators, regulators, attorneys, and privacy, security and compliance officers, the summit topics ...
Category:   Business - Healthcare - Healthcare Management

JChains Java Security Policy Generator (Popularity: )
http://www.jchains.org/
Allows security auditors to record and optimize permissions needed by Java applications.
Category:   Computers - Programming - Languages - Java

Janus Associates (Popularity: )
http://www.janusassociates.com
Security consulting and software company. ICU (Integrity Concerns Uncovered) runs on z/OS.
Category:   Computers - Software - Operating Systems - Mainframe

Livermore Software Laboratores, Intl. (Popularity: )
http://www.lsli.com
Providing the PORTUS products for over ten years with a perfect security record. Offers Gigabyte+ levels of performance, and is scalable from the smallest business to worldwide organizations.
Category:   Computers - Security - Firewalls - Products

Lancope (Popularity: )
http://www.lancope.com
Features a dynamic threat management system that monitors security breaches and internal misuse without relying on attack signatures.
Category:   Computers - Security - Intrusion Detection Systems - Products and Tools

Information Shield, Inc (Popularity: )
http://www.informationshield.com
A global provider of pre-packaged security policies and customizable implementation guidance.
Category:   Computers - Security - Policy - Companies

HIPAA Secure Email - Secure Gateway - SafetySend.com (Popularity: )
http://www.safetysend.com
HIPAA compliant software solutions such as secure email, secure gateway, and HIPAA compliance information.
Category:   Computers - Security - Policy - HIPAA

InterSect Alliance (Popularity: )
http://www.intersectalliance.com/
Specialists in intrusion detection and auditing, forensics, and security policy development.
Category:   Computers - Security - Consultants

Internetworking Strategies Ltd (Popularity: )
http://www.insl.co.uk/
Network security consultants providing advice on security policy, strategy and design. Also provides implementation and support.
Category:   Computers - Consultants - Network - I
Go to 1 2 3 Next >> page