data compliance

Results 101 - 125 of 516Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Published By: Dun & Bradstreet     Published Date: Nov 13, 2017
You’re on the hook for more than just moving prospects through the funnel and delivering leads to sales. You’re responsible for managing the customer relationship. But how does it feel to the customer when that transition takes place? All too often, the first contact with sales feels like starting the conversation over again. And for customers who have already invested time and energy learning about a company and their products, this can be a jarring experience. Great composers use consistent melodic themes over the course of a piece. As marketers, it is our responsibility to ensure there is harmony and consistency over the full lifecycle of the customer relationship. But linking the conversations that marketing and sales have with prospects depends on your ability (and willingness) to share insights that are born from data.
Tags : 
data, sales, marketing, relationship management, suppliers, customers, finance, compliance
    
Dun & Bradstreet
Published By: Vormetric, Inc.     Published Date: Jan 11, 2016
SAP has reviewed and qualified Vormetric’s Transparent Encryption as suitable for use in SAP HANA solution environments. Vormetric provides a proven approach to securing SAP data that meets rigorous security, data governance and compliance requirements. Vormetric Data Security can be quickly deployed to secure data while requiring no change to SAP, the underlying database or hardware infrastructure. This approach enables enterprises to meet data governance requirements with a rigorous separation of duties. Whether you are securing an existing SAP deployment or upgrading, to a new version, Vormetric delivers a proven approach to quickly secure SAP data while ensuring SAP continues to operate at optimal performance.
Tags : 
sap hana, data security, encryption, virtustream, cloud security, encryption keys, big data, compliance, advanced persistent threats, apt, insider threat, security, data center
    
Vormetric, Inc.
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation, is a piece of legislation that was approved and put in to place by the European Parliament in April 2016. As European Law, it will fully take effect after a 2-year transition ending May 25th 2018. GDPR, replaces the previous Data Protection Directive (DPD), adopted in 1995, and will in the UK, replace and strengthen the Data Protection Act 1998 (DPA). One of the initial differences between GDPR and DPD, is that GDPR is a regulation not a directive; as a regulation, no additional enabling legislation will have to be passed by governments of member states. Redstor have the ability to give insight into the data organisations have on their networks, advise on best practice to protect data and then implement strategies around backup, archiving and disaster recovery. Data is searchable through an intuitive console making compliance simple and achievable for all organisations protecting data through the Backup Pro Platform.
Tags : 
    
Redstor UK
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
The EU General Data Protection Regulation (GDPR) represents a significant step change for data protection across EU member states. The EU GDPR also brings with it serious implications for organisations who suffer a breach. People will always make mistakes – and in busy and stressful workplaces such as banks and insurance firms the likelihood of this increases. Without the right processes and technologies in place to help avoid mistakes, sensitive client information remains at risk. This white paper provides financial services organisations with a four-step process to ensure compliance.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: Dell EMC     Published Date: Oct 30, 2019
Midmarket firms face many of the same data center security risks as their enterprise counterparts with far fewer resources at their disposal to mitigate them. Downtime, data theft, and regulatory non-compliance all pose existential threats to these organizations and as they drive for continuous innovation and advantage in an increasingly competitive landscape, they must ensure valuable data and IT assets are secure, protected, and available at all times. How can midmarket organizations succeed in the face of these challenging market dynamics? This Research Insights report shows that the success organizations have enjoyed varies greatly, and further that organizations enjoying the greatest success demonstrate a clear organizational commitment to prioritizing security and operate fundamentally more secure data center environments. Download this report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: NAVEX Global     Published Date: May 06, 2016
This report outlines Data & Analysis to Help You Benchmark Your Programme Against the World’s Largest Ethics & Compliance Hotline Database—and Enhance Your Ethics & Compliance Programme Effectiveness.
Tags : 
data analysis, benchmarking
    
NAVEX Global
Published By: CA WA     Published Date: Aug 15, 2008
Despite increasingly complex data center environments, IT is expected to provide business owners with faster service, higher reliability, and greater agility than ever before – all within a tight budget. It is impossible to meet these goals with manual IT processes. However, EMA research shows that IT Process Automation (ITPA) helps achieve these goals, delivering annual savings of $500,000 on staff costs alone, and 64 hours of additional uptime per year – plus improved resource utilization, security and compliance, problem response times, and agility.
Tags : 
workload automation, ca wa, computer associates, automation, bpm, bpa, it management
    
CA WA
Published By: CA WA 2     Published Date: Oct 01, 2008
Data Center Automation enables you to manage change processes, ensure configuration compliance and dynamically provision servers and applications based on business need. By controlling complexity and automating processes in the data center, your data center becomes more adaptive and agile. Effective Data Center Automation lets you leverage virtualization, manage capacity, and reduce costs and also helps reduce energy usage and waste.
Tags : 
it automation, ca wa 2, ca wa, data center automation, datacenter automation, configuration
    
CA WA 2
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification, cloud security, cloud based security saas security, strong authentication, fingerprint, full disk encryption, single sign-on, cloud management
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Kofax     Published Date: Sep 08, 2011
This whitepaper will review how business processes are more efficient in an electronic data environment. Enterprise Capture enables customer service improvement, cost cutting, and compliance for financial institutions such as Flagstar and Randolph Brooks Federal Credit Union (RBFCU).
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
    
Forrester
Published By: RSA Security     Published Date: Jan 07, 2014
Watch this on-demand webcast to learn how you can accelerate your security transformation from traditional SIEM to a unified platform for incident detection, investigation and advanced security analysis. Understand why organizations are moving to a true big data security platform where compliance is a byproduct of security, not the other way around.
Tags : 
security analytics, siem, advanced threats, best practices, security visibility, log collection, security
    
RSA Security
Published By: Red Hat     Published Date: Sep 25, 2014
As a strategic partner in your business, you face increasing demands from your line-of-business leaders for new functionality and advanced capabilities, which you must deliver with a constrained IT budget. What could you do to meet these expectations and add value to the business if you could contain costs, increase operational efficiency, and do more with less? You need to overcome several challenges. The cost of software licensing management is rising as a result of maintaining proprietary platforms or legacy technology, making it difficult to modernize your datacenter and migrate to more cost-effective solutions. You’re likely burdened by regulatory compliance mandates, which create enforcement, reporting, and auditing expenses. And, like 67% of IT organizations, your budget is probably shrinking. Red Hat can help. Red Hat® Enterprise Linux® gives you the high-value subscription model, built-in governance processes, and simplified migration path you need to aggressively lower your
Tags : 
increased demands, functionality, software licensing management, proprietary platforms, legacy technology, datacenter, it organization, it management, enterprise applications, data management
    
Red Hat
Published By: Delphix     Published Date: Mar 24, 2015
Cloud deployments are becoming essential to all businesses, but face several challenges: cost, compliance, and agility. Delphix Data as a Service is a scalable and flexible deployment platform enabling organizations to achieve compliance and data management agility, while lowering costs.
Tags : 
    
Delphix
Published By: Delphix     Published Date: Mar 24, 2015
Poor data archiving can lead to non-compliance with regulations. This white paper outlines Delphix's Live Archive, which can build a condensed copy of a data source that can be accessed on demand and quickly while also bookmarking data sources to restore any application so one can comply with regulations.
Tags : 
    
Delphix
Published By: MarkLogic     Published Date: Jun 19, 2017
Integrate your data silos to finally navigate the data maze. This comprehensive white paper addresses a key element in any GRC program: regulatory compliance. Download this paper to learn about the costs, current practices, and associated risks. We’ll also recommend a technologically-enabled approach and highlight its main business benefits for financial services, insurance, and energy companies. Overview Executive Summary Compliance Requirements A Recommended Approach Business Benefits Regulatory Compliance Solution Architecture Related Materials
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting, energy, insurance
    
MarkLogic
Published By: MarkLogic     Published Date: Jun 19, 2017
There is opportunity in the ongoing turbulence throughout the financial industry; however, regulatory and compliance challenges absorb resources and distract focus away from growth. Download white paper to learn about a smart approach to data and innovative tools that build resilience into a business looking to not just weather the storm, but seize the advantage. Overview: - Executive Summary - Challenges of Financial Markets Today - The Need for a 360-View of Data - How to Deliver: Increased Transparency Adapt to Evolving Regulations Improve Compliance and Lower Cost - Solution Architecture for Regulatory Reporting - Case Study: Adapting to Regulatory Complexity "Disparate systems led to frequent cycles spent correcting errors within the data”.
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: MarkLogic     Published Date: Jun 21, 2017
Remember Y2K – the IT “problem” that should have brought businesses to a screeching half? Despite the hype, the preparation led to widely documented business benefits and uncovered new opportunities that transformed organizations worldwide. Similarly in today’s highly regulated Financial Services industry, enabling GRC by integrating data from silos can be the driver for future business use cases like machine learning and anti-fraud detection services. GRC can be your catalyst for new opportunities. Listen in as our panel of financial services experts discuss the keys to reinventing your data strategy. We’ll cover: How to align your GRC strategy with a business transformation agenda How to ensure your organization’s approach to data management isn’t just a one-off solution, but a comprehensive one adaptable to changing regulations How to navigate the increasing regulatory demands for granular data security How to turn your compliance spend into new opportunities to earn revenue
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting, business transformation, fraud, digital transformation
    
MarkLogic
Published By: MarkLogic     Published Date: Jun 21, 2017
Global financial organizations are facing increasing demands from the business for more granularity, transparency, reporting and security. If you’re on the IT side, you know this adds a different set of ‘mores’ to the equation: More duplication, delays, and people. What’s the net-net? More cost and more risk. You can balance the scales to satisfy those demands. And it starts with thinking differently about data management. Our financial services technology experts will explore the implications of governance, risk and compliance (GRC) imperatives. You’ll learn: • Why data is at the heart of an effective and dynamic GRC strategy • Why technological capabilities used to enable standard GRC programs can reduce transparency and prevent you from gaining a holistic view of your data • A new approach to data can provide the business with complete transparency • Review a sample regulatory reporting architecture Stop burning time on tooling — and start building a dynamic GRC strategy that can
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: Mimecast     Published Date: Mar 13, 2017
The EU General Data Protection Regulation (GDPR) is arriving soon. You may think your organization is immune from its impact, but if you do business with any customers in the EU, think again. You’ll need to rethink and possibly re-do your organizational processes around compliance and oversight. It may seem like a daunting task. The Forrester Research Brief “You Need an Action Plan for the GDPR” helps your security, regulatory and privacy teams grasp five must-have changes necessary to comply with the GDPR.
Tags : 
    
Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.