BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Alleviate Regulatory Compliance Strains on IT Pros

Posted June 19, 2012    Peter McCalister

As regulations continue to evolve and audits become even more comprehensive, many organizations are resource- strained trying to comply with critical government regulations. The reality is these regulations are unforgiving and non-compliance results in penalties, lost business and other indirect costs. A centralized solution to manage compliance provides a more actionable intelligence to available manpower without losing sight of broader IT security protections.

IT departments can waste a significant amount of time trying to manually prepare compliance audits and reports to management. In a recent poll by eEye Security, more than 85 percent of IT pros are impacted by regulatory compliance and industry standards including ISO, PCI, DSS, and HIPAA. The report further shows efficiently managing this takes up to 50 percent of their work week. Put into perspective, that is entirely too much time where efforts could be focused on actually reducing the threat landscape, rather than reporting on it.

To combat the vast economic ramifications of cybercrime, new regulatory mandate such as FISMA and FedRAMP for the cloud, require continuous monitoring and reporting of security processes. This order is a truly critical point to make to organizations in light of a continuously changing threat lanscape. Raising the wall against their malicious counterparts has to happen. This trend is only going to compound as time goes on, however there are ways to manage this without companies having to spend more.

Implementing strategic solutions that simplify this regulatory maze is invaluable to IT pros trying to maintain a tight perimeter around their organizations. Automated processes for compliance management for corporate policies, government regulations, and industry standards, keeps organizations up-to-date with changes to regulatory controls and newly discovered vulnerabilities. IT departments can now navigate through the regulatory landscape with all the information compiled into a dashboard, instead of the time straining task of extracting the raw data manually. Daily compliance can be timely, repeatable, and more importantly actionable when compliance violations arise.

Leave a Reply

Additional articles

Ponemon_Report

Big Surprise: Cost of Data Breaches Up; Are you Doing the *Right* Things to Mitigate the Costs?

Posted May 28, 2015    Scott Lang

Ponemon Institute Cost of Data Breach Study – costs are going up – to the tune of a 23% increase in total costs of data breaches, and a 12% increase in per-record cost since 2013. Are you doing the right things to mitigate costs?

Tags:
, ,
IRS-Data-Breach

The tip of the IRS data breach – and it IS an iceberg

Posted May 27, 2015    Morey Haber

The IRS has been warned for decades about their security best practices. And now, at least 100,000 Americans have had their records compromised. How? The IRS uses a service called “Get Transcript”.

Tags:
, , ,
dave-shackleford-headshot

Tales from the Datacenter: Vulnerability Management Nightmares

Posted May 27, 2015    Dave Shackleford

Vulnerability scanning, threat management, risk analysis, patching, and configuration management are some of the major activities usually associated with vulnerability management, and none of these are new…so why are we failing so badly at many of them?

Tags:
, ,