compliant

Results 26 - 50 of 183Sort Results By: Published Date | Title | Company Name
Published By: Rackspace     Published Date: Mar 20, 2019
Banks embarking on any cloud activities must first overcome the compliance of rigorous security policies and regulations. For its 100th anniversary commemorative website, The Bank of East Asia (BEA) partnered Rackspace Professional Services – for expertise and advice on advanced cloud management, best practices and security – to help with the designing of a highly secured and compliant AWS environment to host the new, celebratory website.
Tags : 
    
Rackspace
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Feb 18, 2019
The largest national multiline insurance had built a repository of Insurance policies (P&C and Life Insurance) on Microfilm and Microfiche in early 90’s, as a preservation strategy. They were grappling with issues as this technology became outdated over time: • Risk of losing their only source of data for Insurance policies and corresponding communication, need to improve data availability and speed of claims evaluation • Compliance issues, need of a WORM (write once read many) storage compliant with FINRA regulations, where data should be encrypted when at rest • Total cost for digitization compared to 10-12 years of support left to maintain insurance policies was not very encouraging • Required a low cost, cloud-based, FINRA-compliant document management solution which could provide quick access to stored data Download complete case study to know how LTI’s e-Office sDownload full case study to know how LTI’s e-Office solution enabled 50% TCO for Largest national Multiline Insurance.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: RES Software     Published Date: Jul 03, 2012
Give your clinicians access to a single, secure and HIPAA compliant workspace. Using their laptop, tablet or smartphone, they can quickly access patient data on the go, while you retain control of your devices.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, desktop migration
    
RES Software
Published By: Dell     Published Date: Sep 26, 2017
Government leaders have the unprecedented opportunity to accelerate the path to IT modernization. Download this whitepaper to learn more about the IT trends driving digital transformations and the considerations to be made in determining a successful strategy toward effective and compliant IT modernization. With the right approach, organizations can create an efficient and future-ready launching pad to agilely, cost-effectively and securely meet the needs of constituents, employees and internal customers; accommodate increasing data volumes; and comply with regulatory requirements.
Tags : 
    
Dell
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: KPMG     Published Date: Oct 22, 2018
Top 5 Factors Every Bio-Tech and Pharmaceutical Company Must Keep in Mind. Successfully launching a product in the U.S. requires a balance across commercial strategy, government programs, and contracting operations. While the market holds significant opportunity, there are also complexities that need to be considered prior to launch. To prepare for the launch of your drug in the U.S. market, download a copy of Navigating the U.S. Government Market to help your organization remain compliant with government operational and pricing requirements.
Tags : 
    
KPMG
Published By: Jeppesen     Published Date: Aug 06, 2019
Now that the baseline monitoring phase of CORSIA (Carbon Offsetting and Reduction Scheme for International Aviation) has gone into effect, your airline is probably investing more into its emissions program—more reporting, more cost and more time. Watch this webinar to learn all about CORSIA, what it takes to get compliant, and how a single solution can help you monitor, report and track offset obligations.
Tags : 
aircraft emissions, aircraft operations, emissions, corsia
    
Jeppesen
Published By: Sage People     Published Date: May 21, 2018
At Sage, we love payroll. We’ve pulled together advice from our experts about how to make paying your staff, quick, easy and stress free. Tell us what you’d like to achieve, and we’ll tell you how your approach to payroll can help: • SAVE TIME AND MONEY • BOOST STAFF SATISFACTION • DRIVE MORE PROFITABLE GROWTH • STAY COMPLIANT
Tags : 
    
Sage People
Published By: Cisco     Published Date: Apr 20, 2016
Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.
Tags : 
cisco webex, meeting center, security, web conferencing, video conferencing, fedramp, networking, wireless
    
Cisco
Published By: Cisco     Published Date: Apr 20, 2016
Go ahead. Create and join meetings easily from your computer or mobile device. Invite participants to share content in real time. See who you’re talking to. All in a highly secure environment. This is now reality for government agencies, thanks to Cisco WebEx® Web Conferencing, a FedRAMP-compliant service. As a FedRAMP-compliant solution provided by the market leader in web and video conferencing, Cisco WebEx Web Conferencing lets you: • Easily meet face to face with meeting participants from other locations • See and hear the same information at the same time with attendees • Collaborate and increase productivity without the need for travel • Make meetings more engaging with high-definition (HD) video, audio, and content sharing
Tags : 
cisco webex, web conferencing, productivity, connectivity, government agencies, fedramp, video conferencing, networking
    
Cisco
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: TriNet     Published Date: Nov 08, 2017
Most business owners realize, from the moment they hire their first employee, that human resources (HR) can be a tedious and time-consuming process. Now is a particularly critical time to ensure that your HR functions are being properly managed and are compliant. Download this checklist to learn how to navigate the complexities."
Tags : 
    
TriNet
Published By: Smarsh     Published Date: Dec 07, 2016
To meet the requirements of FINRA & SEC, you must first understand what they require of investment firms and organizations. Better yet, you must understand what is classified as a violation of those rules, then put practices in play that mitigate the risk and position you as an active advocate for compliance— not a violator or passive enabler for non-compliant activity.
Tags : 
    
Smarsh
Published By: IBM     Published Date: Jun 19, 2018
How The Right Tools And Strategies Can Help Companies Reap Business Benefits Through Sustained GDPR Compliance.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
Data is multiplying rapidly in quantity and variety for enterprises of all kinds. In multicloud environments, a range of data sources is exponentially increasing the stream of incoming information, from the Internet of Things and social media, to mobile devices, virtual reality implementations and optical tracking. While organizations are readily investing in artificial intelligence (AI), most haven’t done due diligence to understand their data or ensure the quality of data needed to benefit from AI solutions. In many organizations, their data is inaccessible, unreliable, or non-compliant with data privacy and protection rules.
Tags : 
    
Group M_IBM Q4'19
Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic
Published By: Oracle     Published Date: Sep 30, 2019
Do you want more powerful insights from your data? Are you looking for ways to make your data more secure? Hear how you can do this using technology, AI, machine learning, and automation in a secure, compliant, and sustainable way. In this episode of tomorrow talks with IDC and Oracle the conversation moves on from who’s responsible for data security to making sure data delivers value. To find out more download the webinar today.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 09, 2019
Do you want more powerful insights from your data? Are you looking for ways to make your data more secure? Hear how you can do this using technology, AI, machine learning, and automation in a secure, compliant, and sustainable way. In this episode of tomorrow talks with IDC and Oracle the conversation moves on from who’s responsible for data security to making sure data delivers value. To find out more download the webinar today.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2012
Banks must meet more (and more varied) regulations today than ever. The sheer scale and scope of banking regulations.
Tags : 
oracle, finance, oracle financial services, rish and treasury operations
    
Oracle
Published By: Oracle     Published Date: Nov 06, 2012
Banks must meet more (and more varied) regulations today than ever. The sheer scale and scope of banking regulations.
Tags : 
oracle, finance, oracle financial services, rish and treasury operations
    
Oracle
Published By: Imprivata     Published Date: Dec 06, 2013
The vital information CIOs need to ensure that their text messaging is both secure and in compliance with the current regulations.
Tags : 
secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications, authentication, mobile workers, wireless communications
    
Imprivata
Published By: Epicor     Published Date: Apr 17, 2018
Running a successful firearms and shooting sports retail business offers unique challenges. To achieve growth, you need a software solution that streamlines nearly every aspect of your firearms business—letting you focus on running a more compliant, efficient, and profitable operation. Created in collaboration with Orchid Advisors, Epicor FFL Compliance Manager is a robust, cloud-based system for firearms retailers that seamlessly manages ATF compliance for higher profits and faster growth. This fast, easy-to-use bound book solution can: • Quickly package compliance reports on demand and review bound book activity with dashboards to support ATF inspections • Save time by scanning serial numbers instead of entering them manually • Relieve audit stress thanks to easy access to bound book data and on-demand, ATF-friendly reporting Read on to hear from businesses currently powered by Epicor FFL Compliance solutions.
Tags : 
firearms collection software, firearms inventory software, firearms management system, firearms tracking software
    
Epicor
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.