IT Security and Compliance

  • Managing Risk Compliance Throughout the Change Management Process

    Managing Risk Compliance Throughout the Change Management Process

    Raise your hand if this situation sounds familiar: you need to make changes within your organization, and these changes are crucial and quite urgent. At the same time, there are...

    Read Article
  • 3 Ways to Manage & Reduce Incidents

    3 Ways to Manage & Reduce Incidents

    Organizations, regardless of size or maturity, will always run into IT related incidents. The trick, however, is to ensure that these incidents cause the least amount of downtime as possible for the c

    Read Article
  • The Sarbanes-Oxley Act: The Role of IT

    The Sarbanes-Oxley Act: The Role of IT

    While there are many facets to SOX compliance, change management has emerged as its cornerstone. To ensure and demonstrate that only authorized and intended alterations have been made, all changes to

    Read Content
  • ChangeGear: PCI Compliance Solution Brief

    ChangeGear: PCI Compliance Solution Brief

    Complying with PCI security standards (version 3.2) is essential for any size organization. Violation of these guidelines can lead to potential fines. Many companies find that there are certain barrie

    Read Content
  • ChangeGear NERC CIP Compliance

    ChangeGear NERC CIP Compliance

    Complying with NERC CIP standards is essential. Violation of these mandates can be extremely expensive - costing you up to $1 million per day in fines. Many companies find that there are certain barri

    Read Content
  • Have questions? We provide solutions.

    MESSAGE US
  • AI For Service Desk Video: Speeding Up IT Employee Onboarding

    AI For Service Desk Video: Speeding Up IT Employee Onboarding

    When it comes to onboarding new IT support staff for the service desk, IT managers need to be mindful of costs and resources it will take to get them up to speed. ChangeGear's Service Smart Technology

    Read Article
  • Change Management for Agile IT

    Change Management for Agile IT

    Are traditional ITIL-based processes the only true way to effectively implement change management? Or can there be room in the Agile IT world for change tracking and regulatory compliance without beco

    Read Article
  • Change and Configuration Management for Government

    Change and Configuration Management for Government

    The Federal Information Security Management Act (FISMA) is a federal law enacted in 2002 to recognize the importance of information security to the economic and national security interests of the Unit

    Read Content
  • IT Security: How to Manage Employee Offboarding the Right Way

    IT Security: How to Manage Employee Offboarding the Right Way

    The IT department has a lot to worry about these days. From the weighing demands of the CIO in light of digital transformation, to preparing for IT outages during times of disaster, not...

    Read Article
  • 3 Ways That ITIL Can Support IT Healthcare Organizations

    3 Ways That ITIL Can Support IT Healthcare Organizations

    The Health Insurance Portability and Accountability Act (HIPAA) compliance mandate is always a top of mind concern for any IT decision-maker involved in the healthcare sector. MedicineNet defines...

    Read Article
  • How to Overcome Cybersecurity Challenges in Financial ITSM

    How to Overcome Cybersecurity Challenges in Financial ITSM

    Last year, a comprehensive IT security report published by the U.S. Government Accountability Office detailed the inner workings of 15 major and minor depository institutions, as well as where...

    Read Article
  • A Look at Today's Financial Services: Where Can an Advanced Service Desk Help?

    A Look at Today's Financial Services: Where Can an Advanced Service Desk Help?

    Financial institutions have undergone considerable operational changes over the last decade, necessitating greater security over the information providers use to conduct day-to-day business....

    Read Article
  • Stay updated on the latest ITSM thought leadership! Check out the SunView Software Blog.

    TAKE ME THERE!
  • DevSecOps and Change Management: The Next Frontier for ITSM

    DevSecOps and Change Management: The Next Frontier for ITSM

    A SANS Institute study performed in late 2015 and released earlier this year revealed IT security budgets have risen in a number of different industries including health care, government,...

    Read Article
  • 4 Ways Advanced Change Management Supports Best Practices for SOC 2 HIPAA Compliance

    4 Ways Advanced Change Management Supports Best Practices for SOC 2 HIPAA Compliance

    Recently, we discussed the basics of SOC 2 HIPAA compliance, what it entails and how IT service management offerings could help businesses stay on regulators' good sides and out of the data...

    Read Article
  • Diagnosing Data Security: SOC 2, HIPAA and Change Management Software

    Diagnosing Data Security: SOC 2, HIPAA and Change Management Software

    Back before the age of big data, the gravest concern regarding medical records was a breach of doctor/patient confidentiality. And in a way it still is - today's digital environments host the...

    Read Article
  • Small Business PCI Compliance: The Risks and Rewards of Security Through Change Management

    Small Business PCI Compliance: The Risks and Rewards of Security Through Change Management

    Never judge a small business by its size - these mirco enterprises pack a wallop - the Small Business Administration estimates there are more than 28 million small businesses in operation today....

    Read Article
  • What NERC CIP Version 5 Means for the Future of IT Service Management

    What NERC CIP Version 5 Means for the Future of IT Service Management

    What do high-voltage power lines and IT service management software have in common? As of April 1, 2016, their futures both hinge on the compliance with these seven letters: NERC CIP. Let's...

    Read Article
  • 3 Ways to Apply Change Management For Regulatory Compliance Standards

    3 Ways to Apply Change Management For Regulatory Compliance Standards

    Complying with regulatory standards is a growing priority for businesses in diverse fields. As organizations become more dependent on IT, they have run into a situation where protecting data is...

    Read Article
  • Change Management Applications: NERC/CIP Tracking

    Change Management Applications: NERC/CIP Tracking

    NERC/CIP regulations create a situation in which the organizations that handle the energy power infrastructure that is critical to both organizational and national security must carefully and...

    Read Article
  • Understanding Why Process is Key to IT Security

    Understanding Why Process is Key to IT Security

    Process excellence is a topic that has often dominated executive conversations, but not been a huge part of the IT industry. This is beginning to change as complexity rises across the industry...

    Read Article
  • loading
    Loading More...