standards

Results 1 - 25 of 331Sort Results By: Published Date | Title | Company Name
Published By: CheckMarx     Published Date: Mar 04, 2020
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 04, 2020
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 09, 2020
Finanzdienstleister unterliegen strengen regulatorischen Vorgaben – und das zu Recht: Die Assets und Informationen, die von ihnen verarbeitet werden, sind wertvoll und sensible und stehen täglich im Visier von Angreifern. Die von Fintech- Unternehmen verarbeiteten personenbezogenen Daten (PII) unterliegen daher strengen Compliance-Bestimmungen wie dem Gramm-Leach-Bliley Act (GLBA), den Payment Card Industry Data Security Standards (PCI DSS) und dem Sarbanes-Oxley Act. Von zentraler Bedeutung ist auch die Datenschutzgrundverordnung (DSGVO), die den Umgang mit personenbezogenen Daten von EU-Bürgern regelt. Finanzdienstleister, die für US-amerikanische Bankkunden tätig sind, müssen darüber hinaus die Einhaltung von Absatz 5 (Unfair or Deceptive Acts or Practices) des Federal Trade Commission Acts und weiterer Verbraucherschutzvorgaben auf US-bundesstaatlicher Ebene im Blick behalten.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 04, 2020
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: Salesforce     Published Date: Mar 13, 2020
Customer expectations are changing. Companies must transform to stay competitive. Over 8,000 consumers and business buyers worldwide share: • How their expectations of B2C and B2B companies have changed • What they think about emerging technologies like artificial intelligence • Why trust and values have become building blocks of customer relationships Download "State of the Connected Customer" and be informed on the new standards of engagement in the Fourth Industrial Revolution.
Tags : 
    
Salesforce
Published By: Cherwell Software     Published Date: Apr 07, 2016
Recently awarded Best Sandwich Menu Variety from NRN’s Consumer Picks Survey, Jason’s Deli is known for providing healthy menu options and excellent customer service to millions of customers each year. Their goal is to delight customers and create a positive experience every time. The Jason’s Deli IT department is no different. IT sets the same high standards for service delivery as Jason’s Deli does in their restaurants. IT partners with all areas of the business and wants to be “easy to do business with.”
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect, security, business technology
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
    
Commvault
Published By: Red Hat     Published Date: Aug 22, 2018
What does a digital transformation look like? It varies from organization to organization, of course, since they have invested in countless systems and applications over the years. Digital transformation consists of building new applications and next-generation architectures on today’s open standards, using on-demand resources. For many organizations, digital transformation also means optimizing existing systems and application resources – integrating, replacing, or abstracting key pieces of their infrastructures into services.
Tags : 
    
Red Hat
Published By: Financial Force     Published Date: Dec 01, 2017
Download this guide to review three major pain points that companies are facing as they prepare for the new revenue recognition standards-ASC 606 and IFRS 15- as they are fast approaching.
Tags : 
    
Financial Force
Published By: HPE     Published Date: Feb 11, 2015
One of the top priorities for enterprises today is modernizing their data center to transform from the inefficiencies of siloed infrastructure to a modular, efficient, standards based infrastructure.
Tags : 
    
HPE
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Eaton     Published Date: Jul 09, 2018
Our industry has made numerous technological advances designed to protect homeowners, businesses and electrical workers. That makes every fatal electrocution in the home all the more distressing. Between 2010 and 2013, the U.S. saw an estimated average of 48 electrocution fatalities associated with consumer products per year, with large and small electric appliances chief among them1. Tragedies like these can be avoided, especially when the ground fault circuit interrupter (GFCI) technologies needed to prevent dangerous events are readily available. As the principle NEMA representative at the National Electrical Code (NEC) Code-Making Panel Two, I saw public input asking for increased GFCI protection for the home during the 2017 code cycle. The code panel expanded the GFCI requirement for facilities other than dwelling units as part of section NEC 210.8(B). However, residential standards improvements were sidelined.
Tags : 
    
Eaton
Published By: Dell EMC EMEA     Published Date: Mar 13, 2020
VMwarecommissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying its VMware Workspace ONE™ Unified Endpoint Management solutionpowered by AirWatch,particularly to manage Windows 10 devices across a distributed workforce.The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Workspace ONEfor an organization’s Windows 10 modern management transformation initiativetoreduce security risks,improve desktop management processes, reduce costs, and improve employee efficiency. Workspace ONEdelivers greater mobility to employees by managing Windows 10 desktop and laptop devices using a cloud-based, modern management architecture —like the methodsadopted by IT to manage mobile phones—with anywhere access, always up-to-date operational data,all whileadhering to strict corporate security and management standards.
Tags : 
    
Dell EMC EMEA
Published By: Nokia     Published Date: Oct 10, 2019
With unprecedented choice and access to information, today’s customers demand an overall experience that matches their standards for product quality. In the Fourth Industrial Revolution, the definition of a “good” experience has changed. Customers demand not only relevant offers, but to feel truly known and understood as individuals. In a culture of immediacy, they also expect engagement at their exact moment of need. What’s more, this level of engagement is viewed as standard across the entire customer journey, prompting marketers to think well beyond their traditional domain.
Tags : 
    
Nokia
Published By: SAS     Published Date: Apr 16, 2015
As big data shifts away from a more theoretical concept (only adopted by those on the leading edge), the fun can really begin. How do you prepare for more information than you’ve ever collected before? How can you manage this information with the same standards you applied in the past? These are questions that are causing both IT and business sides to start actively preparing for – and implementing – big data.
Tags : 
    
SAS
Published By: HPE     Published Date: Mar 23, 2015
This Porter Consulting report analyzes enterprise campus networking solutions from Aruba Networks, Cisco, HP and Ruckus Wireless. The paper examines key business and technology trends affecting enterprises with 500-5000 employees. We identify fundamental requirements IT decision makers should consider when evaluating campus networking solutions including: • Ensuring simple, secure and cost-effective user access • Supplying adequate bandwidth and quality of service • Streamlining deployment and operations • Supporting emerging standards and technology requirements Our goal is to provide business and technical decision makers with a guide to the key players and their strengths.
Tags : 
    
HPE
Published By: Schneider Electric     Published Date: Sep 19, 2017
When your power system has aging switchgear, you need to work harder to maintain safety and reliability. But easy-to-install options are available to upgrade aging switchgear to bring safety and reliability up to modern standards. Find out how switchgear modernization works in the comprehensive "Answer Guide: Make Aging Switchgear Last Longer and Perform Better." The guide includes information like the 4 Big Wins of Modernization, embedded demonstration videos, an FAQ on how to modernize and links to other modernization resources.
Tags : 
switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric, circuit breaker upgrade, obsolete switchgear
    
Schneider Electric
Published By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
Published By: Pega     Published Date: Aug 12, 2016
Today’s banks are facing enormous pressures that include regulatory requirements, hefty penalties, increasing customer service demands, and ferocious competition from other financial institutions rapidly embracing customer-centric technology. Despite these challenges, banks can’t afford to scale down any efforts to ensure the highest standards of customer service
Tags : 
pega, customer service, finextra, service requests, inquiry handling
    
Pega
Published By: Global Payments     Published Date: May 02, 2019
Doing business across borders presents a whole host of unfamiliar challenges to today’s merchant. As technological advancement and increasing globalization unlock international markets, it’s tempting to imagine that a business model successful in one region can simply be transplanted into another. Not so. The logistics of domestic and international transactions have changed, and so too have customer expectations and preferences. Customer and merchants pain points have transformed and multiplied. In this report, we explore some of the core challenges businesses today face in their quest to succeed in global commerce. We offer an overview of how unified commerce can both resolve these issues and offer new advantages and standards of best practice, enabling your business to meet the demands of tomorrow’s customer, no matter their location, preferred payment method, and mode of contact.
Tags : 
unified commerce, global commerce, payment convenience, payment speed, global payments technology, retail, wechat pay, alipay, chinese wallets, mobile payments, international payment solutions, international payment systems, payments, online payments, omnichannel commerce
    
Global Payments
Published By: The TriZetto Group     Published Date: Oct 20, 2011
The evolving healthcare landscape has created a wealth of fresh opportunities for payers. There is a sense of urgency for payers in leadership roles to leverage technology and successfully transition to a value-driven healthcare system that rewards top performers and high quality standards. Passage of the Patient Protection and Affordable Care Act (PPACA) quickly changed many aspects of payers' business with higher costs, new oversight, more competition and a longer-term promise of millions of new members. Since healthcare insurance reform became law, opponents have vowed changes, if not its outright repeal. While it may be tempting to take as little action as possible and hope that the 2010 mid-term election or 2012 general election will make this all go away, the reality is that repeal is not a likely possibility.
Tags : 
trizetto, healthcare, healthcare reform, ppaca, investments
    
The TriZetto Group
Published By: Red Hat     Published Date: Feb 22, 2019
Geschäftskritische Anwendungen erfordern eine nachweislich stabile Plattform. Mithilfe von Red Hat Enterprise Linux erzielen Sie deutliche Geschäftsergebnisse, und zwar dank einer außergewöhnlichen Zuverlässigkeit und Sicherheit nach Militärstandards. Mit einer Red Hat Enterprise Linux Server Subskription sind Sie mit dem branchenweit größten Ökosystem aus Partnern, Kunden und Experten vernetzt und haben dadurch beste Erfolgsaussichten. Weitere Informationen erhalten Sie in diesem Datenblatt.
Tags : 
    
Red Hat
Published By: Kindred Hospital Rehabilitation Services     Published Date: Jul 10, 2019
Rehab programs will experience a major infux of medically complex patients, including those with neurological conditions, in the coming decades. The drastic increase is being spurred by an aging population. For instance, stroke prevalence is expected to rise by 21% by 2030, and more than 1.2 million citizens are projected to have Parkinson’s disease. This leaves rehab leaders with one signifcant question: What can be done to prepare for the increase of medically complex patients? By evolving to meet the needs of this changing population, rehab programs can successfully meet the challenge, providing patients with the highest level of care while achieving greater performance standards. In this whitepaper, we’ll examine the three areas that drive the greatest impact on treating medically complex patients: • Clinical staff • Tech innovation • Patient and family member experience
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: LastPass APAC     Published Date: Mar 30, 2020
"LastPass has analyzed over 47,000 businesses to bring you insights into security behavior worldwide. The takeaway is clear: Many businesses are making significant strides in some areas of password and access security – but there is still a lot of work to be done. Use of important security measures like multifactor authentication is up, but the continued reality of poor password hygiene still hampers many business’ ability to achieve high standards of security. In the report, we not only highlight key trends by company size, sector, and location, we provide analysis and recommendations to help IT and business leaders take action where it’s needed most. Download the free report today to see the current state of password security, access, and authentication around the world – and learn what you can do today to better secure your company."
Tags : 
    
LastPass APAC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.