This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
McAfeeŽ Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.