data compliance

Results 1 - 25 of 509Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Look Listen     Published Date: Oct 04, 2019
Simply put: Marketing isn’t what it used to be. If you want to compete in this rapid digital world, you need to make your customers happy. Constantly. We’ll get you started with nine of the most exciting trends developing in the world of marketing in 2019. With this report, you’ll learn: How the new director of marketing data position and GDPR compliance can build customer trust. What it means for customer centricity now that MarTech and AdTech are finally coming together with AI and machine learning. How to adjust your business purpose to create customer loyalty as the attention economy shifts to the emotion economy.
Tags : 
    
Look Listen
Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
Astaro
Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA
Published By: Dell EMC     Published Date: Sep 12, 2016
Your business has tiers of applications and data. The protection needs of those application and data across a spectrum—starting with basic low cost daily backup, and ranging up to zero data loss with zero downtime. Along the spectrum, compliance requirements must also be met.
Tags : 
    
Dell EMC
Published By: SAS     Published Date: Jan 17, 2018
Compliance doesn’t have to be a scary word – even when facing the multifaceted challenges of meeting the European Union’s May 2018 deadline for its General Data Protection Regulation (GDPR). SAS conducted a global GDPR survey among 340 business executives from multiple industries. Based on the results of that survey, this e-book delves into the biggest opportunities and challenges organizations face on the road to GDPR compliance. Read this e-book to learn: How to get started on the best path to compliance, based on advice from industry experts. How to turn this compliance challenge into a competitive advantage. How your peers are preparing across a variety of industries. An end-to-end approach that can help guide your journey to GDPR compliance.
Tags : 
    
SAS
Published By: Infosys     Published Date: May 30, 2018
Customers today are far more concerned about the contents and origin of a product than ever before. in such a scenario, granting them easy access to product information, via digital initiatives such as SmartLabel™, goes a long way in strengthening customer trust in a brand. But it also means expending several man-hours of effort processing unstructured data, with the possibility of human error. Intelligent automation can help save effort and time, with virtually error-free results. A consumer products conglomerate wanted a smart solution to implement SmartLabel™ compliance. See how Infosys helped and the five key takeaways from the project.
Tags : 
automation, brand, information, digital, customer
    
Infosys
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Fortinet’s 2018 Security Implications of Digital Transformation Survey looks at the state of cybersecurity in organizations around the world from the lens of digital transformation (DX). Three hundred responses from CISOs and CSOs at large organizations helped us identify several current trends: n Digital transformation is the most impactful IT trend on businesses today, with 92% responding that it has a large impact today. n Security is by far the biggest challenge to DX efforts, with 85% of respondents saying it has a large impact. n The typical organization saw four attacks that resulted in data loss, outages, or compliance events over two years. n Many companies have automated some of their security procedures, but they are even further behind with other security best practices. n Big chunks of infrastructure remain vulnerable in the typical organization, with 25% of the infrastructure not adequately protected at the typical organization. Looking more deeply into the data, we ident
Tags : 
    
Fortinet EMEA
Published By: Dell EMC     Published Date: Oct 10, 2019
Security leaders have been in front of boards and executive committees long enough to know that security metrics that simply portray statistics from monitoring tools, or count the number of malware attacks, add relatively little value to strategy and budget decisions. Protecting sensitive customer and company data shouldn’t be just a compliance obligation, it should be a business imperative. This is exactly why the right technology partners will help push security, risk, and compliance objectives forward. In March 2019, Dell commissioned Forrester Consulting to evaluate the evolving security trends and technology needed to protect and enable employees. Our study found that empowering employees while adhering to security protocols improves employee productivity. Forrester conducted an online survey of 887 senior business and IT decision makers to explore this topic. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMC
Published By: Box     Published Date: Jul 29, 2019
Most CIOs today understand that digital transformation initiatives can help streamline business process; boost ef?ciency; increase competitiveness; and, broadly, help their organization become disruptive over the long term. Some of the transformation initiatives under way—even in many pace-setting companies—are struggling to manage the exponential explosion of unstructured data and the associated heightened compliance and security demands, however. Fortunately, new solutions that tap arti?cial intelligence (AI) can extract hidden insights from unstructured data, such as documents, images, videos, and audio ?les. AI is also helping automate many of the labor-intensive processes used to classify, organize, and analyze unstructured content
Tags : 
    
Box
Published By: Collaborative Consulting     Published Date: Jan 15, 2014
When a pharmaceutical company discovered its risks under the new Patient Protection and Affordable Care Act, it turned to Collaborative to comb and consolidate its data. The result: compliance and insight into new business opportunities, too, through a company-wide business data warehouse and enhanced business intelligence.
Tags : 
collaborative consulting, data, data warehouse, complicane, risk management, business intelligence, consolidation, infrastructure
    
Collaborative Consulting
Published By: Dell     Published Date: May 04, 2015
Whitepaper that breaks the benefits of switching to private cloud into five clear points. - Cost efficiencies - Greater flexibility and scalability - Enhanced agility - Disaster recovery/business continuity - Data protection and compliance
Tags : 
    
Dell
Published By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
    
IBM APAC
Published By: Teradata     Published Date: Jun 22, 2015
Passed on May 9, 2014, the Digital Accountability and Transparency Act (DATA Act) legislation requires federal agencies to report all expenditures—grants, loans, and contracts—in order to provide American citizens and policy makers better visibility into federal spending. At first glance, new federal requirements— which are scheduled to go in effect May 2017—can seem like imposed obligations with unknown benefits to the implementers. However, wise agencies and early adopters recognize how to transform this new compliance obligation into an opportunity to advance their federal agency by becoming more data driven. The Federal Government maintains vast amounts of data, and the DATA Act establishes data standards and sharing protocols that will help agencies exploit the benefits of data mining and analytics.
Tags : 
    
Teradata
Published By: Teradata     Published Date: Jun 22, 2015
This paper looks at the critical connection between data analytics and the future of tax compliance. It shows how the ability to pinpoint the “right” cases can bring more efficiency—and more revenue—to tax agencies. It also confirms that tax agencies already have vital data at their fingertips; the challenge is to find new and better ways to put it to use. Finally, it describes how a cohesive compliance strategy demands an agile, balanced solution of people, processes, technology, and data.
Tags : 
    
Teradata
Published By: Dell EMC     Published Date: May 09, 2019
Disaster recovery (DR) and long-term retention of data, for security as well as regulatory compliance, can be very challenging for mid-sized organizations. Keeping a secondary site up for DR can get very expensive and dealing with tape can be slow and costly. As a result, many mid-sized organizations are looking to the efficiencies of the cloud, such as scale, elasticity, agility, and lower initial storage costs, to expand their data protection environments. Check out this easy-to-absorb infographic to learn how to achieve powerful, converged, easy to deploy and manage, cloud-ready data protection.
Tags : 
    
Dell EMC
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure, business intelligence
    
Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.