One in two IT Security professional devotes 50 percent of the work week on Regulatory Compliance initiatives according to a new survey. Achieving compliance with regulations such as Payment Card Industry (PCI) guidelines, the Sarbanes-Oxley(SOX), and mandates related to care health takes time, according to results of "2010 Trends and Vulnerability Management Report, which surveyed more than 1,900 IT security professionals and is sponsored by eEye Digital Security. [ahead of the new high-tech companies key InfoWorld Todays Headlines: newsletter First Look . Read Bill Snyder Tech Bottom Line Blog to what the key business trends for you.] The considerable amount of time that security professionals can take the achievement objectives of regulatory compliance does not surprise Dave Wiseman, director of information security and business continuity at St. Lukes Health System in Kansas City, Missouri. This compliance may take up to 50 percent of working time "is probably pretty accurate," Wiseman said. PCI, SOX, HIPAA and HITECH health care bills are among the regulatory requirements that the hospital system must respond, he added. A task of compliance for the organization of health care involves the management of the newspaper, and to this end St. Lukes deployed LogRhythm of centralized log management products to correlate the log data and alerts security from a variety of safety equipment. This allows St. Lukes to establish a panel of security personnel for general use, and "we also use to manage servers, see if the services stop unexpectedly," Wiseman says. Among other results in the "2010 vulnerability and trends Management Report," 73 percent of survey respondents said their organizations have deployed up to 100 applications and 64 percent said applications Microsoft make up 75 percent of deployed applications in their organization. Microsoft applications "will continue to place the greatest impact on organizations when it comes to safety, regulatory compliance and configuration management," the report said.(See also: 10 free Microsoft application for IT and home users ) In a related announcement, eEye Digital Security said it has updated its retina CS Management Console 2.0 for Vulnerability Management for Windows based machines packages, including regulatory reporting on SOX, PCI, and FISMA, and tools for basic configuration and analysis of patch management. " A year ago, we began to invest heavily our engineering efforts on this point, "said Marc Maiffret , co-founder and chief technology officer at eEye, the new version of CS Management 2.0 works with scanners eEye. "These are advanced reporting tools for analysis," Maiffret said, allowing Retina CS Management Console 2.0 to discuss a wide range of definitions and configuration compliance to check if the machines are Windows comply with various requirements. An example is Security Control Automation Protocol (SCAP), which is required by the federal government in its Federal Desktop Core Configuration mandate. Learn more about WAN under Network World Wide Area Network. 2010 greater security Global is an InfoWorld affiliate. Via: Technology central - Digest Watch Description of Source: Blog named Technology central - Digest Watch provide all stuff about blackberry tablet,phone app free,lg thunder phone,samsung galaxy tablet telus,mytouch gingerbread.
Related Posting Search Result:This year will be significantly improved safety and convenience Mobile? The risk of a breach of security and personal privacy increases as smartphones become more capable adopted, the s...
Related Articles -
security, attention, compliance, regulatory compliance hogs security pros, hogs, regulatory, pros, regulatory compliance, security professionals, securitypros,
|