Search results
From GCA ACT
Jump to navigationJump to search
Page title matches
- 1 member (0 subcategories, 0 files) - 04:11, 9 July 2024
- 7 members (3 subcategories, 0 files) - 05:11, 23 October 2023

File:Compliance icon.png (128 × 128 (4 KB)) - 04:30, 22 October 2023- [[Category:Crypto Compliance]]2 members (0 subcategories, 0 files) - 05:10, 23 October 2023
- ...y that offers a suite of advanced data protection tools under their Falcon Compliance product line. Founded in 2011, CrowdStrike's mission is to stop breaches by ...pliance is a sub-organization of CrowdStrike that specializes in providing compliance solutions to businesses of all sizes.642 bytes (82 words) - 03:00, 24 April 2024
- [[Category:Crypto Compliance]]1 member (0 subcategories, 0 files) - 05:10, 23 October 2023
- [[Category:Crypto Compliance]]2 members (0 subcategories, 0 files) - 05:10, 23 October 2023
- 3 members (3 subcategories, 0 files) - 05:11, 23 October 2023
- The Microsoft Security Compliance Toolkit (SCT) is a free, centralized, and automated tool that allows organi717 bytes (99 words) - 05:02, 23 April 2024
- ...ganization found at https://www.akamai.com/products/client-side-protection-compliance, which is based in Akamai. Akamai is a global content delivery network, cyb Client-Side Protection & Compliance is a key feature of Akamai's suite of cloud-based756 bytes (93 words) - 05:02, 23 April 2024
- Demystifying Cybersecurity Compliance Requirements is a resource provided by Deltek, a leading provider of enterp ...a comprehensive guide and resources that explain the various cybersecurity compliance programs, including the Cybersecurity Maturity Model Certification (CMMC),986 bytes (111 words) - 21:59, 5 April 2024
- 4 members (0 subcategories, 0 files) - 04:23, 1 April 2024
- Fairly's AI Risk and Compliance evaluation tool, also known as "AI Compliance in a Box," is a powerful resource designed to guide organizations in ensuri The tool is divided into four main sections: Compliance, Human Rights, Explainability, and Bias. Each section provides an in-depth2 KB (340 words) - 06:54, 9 July 2024
- ...ompliance are: 1) Know your customer (KYC) and Anti-Money Laundering (AML) compliance: Crypto businesses must adhere to KYC and AML regulations. This means colle ...levant laws and regulations. It should include policies and procedures for compliance, training674 bytes (84 words) - 05:01, 23 April 2024
- ...his tool can help businesses avoid fines and penalties associated with AML compliance. [[Category:Anti-Money Laundering Compliance]]627 bytes (79 words) - 14:40, 25 October 2023
- ...and support in protecting data from cyberattacks while ensuring regulatory compliance. It offers industry-leading integrity management capabilities to enhance se ...ntless vulnerabilities and limited insights, and meeting multiple security compliance requirements. These challenges often lead to understaffed and overwhelmed s2 KB (255 words) - 23:55, 25 October 2023
- ...ce that can be shared with regulators. The tool can also be used to verify compliance with contracts, such as supply chain contracts. [[Category:Crypto Compliance]]622 bytes (88 words) - 02:59, 24 April 2024
Page text matches
- ...ompliance are: 1) Know your customer (KYC) and Anti-Money Laundering (AML) compliance: Crypto businesses must adhere to KYC and AML regulations. This means colle ...levant laws and regulations. It should include policies and procedures for compliance, training674 bytes (84 words) - 05:01, 23 April 2024
- ...nce platform designed for the needs of MSSPs and their customers. Simplify compliance, improve security, and get the best rates on cyber insurance. [[Category:Governance, Risk, and Compliance (GRC)]]332 bytes (42 words) - 06:07, 30 April 2024
- ...ce that can be shared with regulators. The tool can also be used to verify compliance with contracts, such as supply chain contracts. [[Category:Crypto Compliance]]622 bytes (88 words) - 02:59, 24 April 2024
- ...and incident management. ComplyCube also provides a central repository for compliance-related data and reports, which can be accessed by authorized users.540 bytes (69 words) - 09:46, 27 October 2023
- ...his tool can help businesses avoid fines and penalties associated with AML compliance. [[Category:Anti-Money Laundering Compliance]]627 bytes (79 words) - 14:40, 25 October 2023
- ...y that offers a suite of advanced data protection tools under their Falcon Compliance product line. Founded in 2011, CrowdStrike's mission is to stop breaches by ...pliance is a sub-organization of CrowdStrike that specializes in providing compliance solutions to businesses of all sizes.642 bytes (82 words) - 03:00, 24 April 2024
- ...to specific users. The solution also includes a reporting tool to generate compliance reports on demand.501 bytes (67 words) - 09:46, 27 October 2023
- This tool is designed to help users find the top seven crypto compliance software for 2020. The software is designed to help users comply with regul https://academy.shrimpy.io/post/top-7-crypto-compliance-software-2022478 bytes (64 words) - 14:43, 25 October 2023
- [[Category:Crypto Compliance]]2 members (0 subcategories, 0 files) - 05:10, 23 October 2023
- [[Category:Crypto Compliance]]2 members (0 subcategories, 0 files) - 05:10, 23 October 2023
- [[Category:Crypto Compliance]]1 member (0 subcategories, 0 files) - 05:10, 23 October 2023
- ...ir PCI DSS controls and to provide recommendations on how to improve their compliance.482 bytes (72 words) - 09:45, 27 October 2023
- ...limity also offers a consulting service to help organizations assess their compliance risks and develop action plans to address those risks.500 bytes (72 words) - 09:45, 27 October 2023
- ...pports multiple use cases such as user provisioning, access certification, compliance reporting, and privileged user management.608 bytes (75 words) - 03:01, 24 April 2024
- ...compliance. It is designed to help organizations meet strict security and compliance requirements, while providing a streamlined user experience. Soffid IAM inc503 bytes (73 words) - 02:57, 24 April 2024
- Demystifying Cybersecurity Compliance Requirements is a resource provided by Deltek, a leading provider of enterp ...a comprehensive guide and resources that explain the various cybersecurity compliance programs, including the Cybersecurity Maturity Model Certification (CMMC),986 bytes (111 words) - 21:59, 5 April 2024
- ...essaging system and document repository to help practices manage and share compliance-related information.733 bytes (87 words) - 09:46, 27 October 2023
- ...pliance requirements, by providing a platform for documenting and tracking compliance-related activities.558 bytes (76 words) - 09:47, 27 October 2023
- ...AwareXM also offers real-time alerts to provide visibility into potential compliance issues as they happen. By using AwareXM, organizations can improve communic735 bytes (99 words) - 05:03, 23 April 2024
- Fairly's AI Risk and Compliance evaluation tool, also known as "AI Compliance in a Box," is a powerful resource designed to guide organizations in ensuri The tool is divided into four main sections: Compliance, Human Rights, Explainability, and Bias. Each section provides an in-depth2 KB (340 words) - 06:54, 9 July 2024
- [[Category:Legal and Regulatory Compliance]]1 member (0 subcategories, 0 files) - 05:10, 23 October 2023
- [[Category:Legal and Regulatory Compliance]]5 members (0 subcategories, 0 files) - 05:11, 23 October 2023
- [[Category:Legal and Regulatory Compliance]]1 member (0 subcategories, 0 files) - 05:11, 23 October 2023
- ...go beyond authentication by providing access control decisions powered by compliance. The purpose of this tool is to help organizations identify and manage cybe ...an trigger remediation workflows to address the issues and bring them into compliance.2 KB (237 words) - 23:54, 25 October 2023
- ...ganization found at https://www.akamai.com/products/client-side-protection-compliance, which is based in Akamai. Akamai is a global content delivery network, cyb Client-Side Protection & Compliance is a key feature of Akamai's suite of cloud-based756 bytes (93 words) - 05:02, 23 April 2024
- ...to help organizations securely store, manage, and retrieve their data for compliance, legal, and productivity purposes. [[Category:Regulatory Compliance]]694 bytes (91 words) - 05:02, 23 April 2024
- ...spects of the network, including asset utilization, software licensing and compliance.787 bytes (106 words) - 14:40, 25 October 2023
- ...re designed to provide visibility into potential security risks, help with compliance audits, and provide guidance on best practices for securing networks.771 bytes (107 words) - 05:01, 23 April 2024
- ...board component, users can view conformance to best practices and evaluate compliance scores over time.340 bytes (46 words) - 23:36, 25 June 2023
- ...board component, users can view conformance to best practices and evaluate compliance scores over time.340 bytes (46 words) - 23:36, 25 June 2023
- ...y analyze data to detect patterns and potential risks, including fraud and compliance violations. Using predictive analytics, the platform can detect anomalies a ...as monitoring and reporting, and provides a centralized repository for all compliance-related information.3 KB (367 words) - 06:53, 9 July 2024
- [[Category:Governance, Risk, and Compliance (GRC)]]418 bytes (55 words) - 03:00, 24 April 2024
- ...reliable tool or resource in place to monitor and control the ethical and compliance aspects of their AI systems. This is where DynamoGuard comes into play. Additionally, DynamoGuard offers real-time monitoring and compliance reporting to help businesses maintain ongoing oversight of their AI systems3 KB (375 words) - 06:53, 9 July 2024
- ...and support in protecting data from cyberattacks while ensuring regulatory compliance. It offers industry-leading integrity management capabilities to enhance se ...ntless vulnerabilities and limited insights, and meeting multiple security compliance requirements. These challenges often lead to understaffed and overwhelmed s2 KB (255 words) - 23:55, 25 October 2023
- ...to be securely stored, shared, and accessed. It also provides auditing and compliance features to help ensure that secrets are used appropriately.371 bytes (53 words) - 09:45, 27 October 2023
- ...rehensive suite of solutions for identifying, protecting, and ensuring the compliance of every cyber asset, including IT, OT, IoT, and IoMT. Forescout, recognize ...rganizations to identify, quantify, and prioritize cybersecurity risks and compliance requirements. This helps organizations make informed decisions and allocate2 KB (251 words) - 23:53, 25 October 2023
- ...t highlights the need for a zero trust approach to ensure the security and compliance of every IoT, OT, Internet of Medical Things (IoMT), and IT device connecte ...ich offers actionable visibility and automated risk-based segmentation and compliance enforcement for all connected devices. Notably, this approach does not requ1 KB (198 words) - 23:54, 25 October 2023
- ...ulations, such as GDPR, CCPA, and HIPAA. This allows businesses to stay in compliance with regulatory requirements, mitigating the risk of legal consequences. ...and secure solution for managing sensitive data. Its advanced technology, compliance with regulations, and data sharing capabilities make it a valuable tool for2 KB (339 words) - 06:54, 9 July 2024
- ...vity on the blockchain and help investigate crimes. Elliptic also offers a compliance platform that helps businesses comply with regulations around the world.469 bytes (66 words) - 23:54, 25 October 2023
- ...ly onboard users, Applications, and devices while maintaining security and compliance.544 bytes (72 words) - 09:44, 27 October 2023
- ...view and manage Office 365 tenants. It provides detailed reports on usage, compliance, and security, and can be used to manage user accounts, licenses, and group444 bytes (65 words) - 09:44, 27 October 2023
- ...IAM system, and it helps organizations to identify and manage risk, ensure compliance, and optimize their IAM system.472 bytes (62 words) - 09:45, 27 October 2023
- ...upply chain management. Exostar also offers a range of risk management and compliance tools.392 bytes (55 words) - 09:46, 27 October 2023
- ...il of all IAM activity, which can be used to troubleshoot issues and track compliance. eClear is available in both cloud-based and on-premises versions.477 bytes (69 words) - 09:45, 27 October 2023
- ...SSO), and access control. With IAM, organizations can improve security and compliance, while reducing costs and improving efficiency.528 bytes (68 words) - 09:46, 27 October 2023
- [[Category:Crypto Compliance]]472 bytes (64 words) - 23:55, 25 October 2023
- ...ssions, and audit activity. SafePaaS also provides a range of security and compliance features, such as encryption, two-factor authentication, and activity monit472 bytes (67 words) - 09:45, 27 October 2023
- ...ecurity, emphasizing total visibility, least privilege network access, and compliance. ...which restricts access to only what is necessary for each user or device. Compliance is also highlighted as a key aspect, ensuring that security measures align2 KB (238 words) - 23:55, 25 October 2023
- ...nagement. SecopsGenie also helps organizations to track policy changes and compliance status.512 bytes (65 words) - 09:46, 27 October 2023
- ...in the data or algorithms, lack of transparency or explainability, or non-compliance with regulations. The report also provides recommendations and suggestions ...assessment and recommendations, the AI Risk Management tool also offers a compliance module. This module helps organizations ensure that their AI practices alig2 KB (360 words) - 06:53, 9 July 2024