regulation

Results 301 - 325 of 466Sort Results By: Published Date | Title | Company Name
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : security
     CDW-Trend Micro
By: Workterra     Published Date: Jan 27, 2016
In a world of increasingly complex financial models, ever-more confusing regulatory demands, and a multi-generational, highly mobile workforce, the future of human capital management (HCM) is wide open.
Tags : workterra, hcm, regulation, mobile workforce
     Workterra
By: AWS     Published Date: Dec 17, 2018
Watch this webinar to learn how Tr?v Insurance Solutions, an insurance agency licensed to sell on-demand property and casualty insurance products, adopted DgSecure on Amazon Web Services (AWS) to anonymize production data to help comply with GDPR and other data privacy regulations. The solution helps Tr?v meet privacy standards while enabling its analytics teams to use data to better serve its clients.
Tags : 
     AWS
By: Oracle     Published Date: Feb 10, 2016
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job. Today, organizations need levels of flexibility, integration, and visibility that are beyond what those systems were designed to deliver.
Tags : oracle, supply chain leaders, cloud migration, supply chain management, operational efficiency best practices
     Oracle
By: VeriSign Incorp.     Published Date: Jul 13, 2009
Be sure your site is in compliance with government data regulations by reading about the different data regulatory standards in this white paper. Learn more today!
Tags : verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, trust, security, compliance, pci, hippaa, sarbanes-oxley, fisma, sox, security, data, data security
     VeriSign Incorp.
By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
Control costs while improving patient care, as well as meet expanding regulatory requirements. This whitepaper discusses virtualized storage solutions for the current generation of Healthcare professionals
Tags : virtualization, healthcare, storage, network, pacs, compliance, regulations, security
     HP and Intel® Xeon® processors
By: Neustar Registry     Published Date: Oct 03, 2011
A brand Top-Level Domain is the next Internet shift. Learn the four benefits of TLDs that every marketer needs to know: campaign management, brand trust, SEO and ROI, and build & protect my brand.
Tags : domain, domains, domain names, new tlds, ntlds, brand marketing, campaign management, cmo, "chain of trust, " domain names, search results, natural search, search engine, web traffic, company reputation, marketing, brand affinity, counterfeit protection, neustar, registry
     Neustar Registry
By: Neustar Registry     Published Date: Oct 17, 2011
The Internet is changing. Learn how applying for your own brand Top-Level Domain (TLD), such as .canon or .hitachi, can help improve natural search, build trust with your customers, and generate revenue through your agent channel.
Tags : seo, tlds, brand, community, gtlds, roi, icann, internet regulation, brand protection, brand marketing, campaign management, cmo, domain names, search results, natural search, search engine, web traffic, company reputation, marketing, brand affinity
     Neustar Registry
By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues, hr trends, screen employees
     iCIMS
By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : data privacy, technology, data, security, safeguards, cloud computing
     Intralinks
By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security
     Intralinks
By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : log management, log collection, log solutions, log storage, security logs
     Alert Logic
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions, security
     Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions, security
     Alert Logic and Sungard Availability Services
By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to today’s security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365—relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
     Microsoft Office 365
By: Rackspace     Published Date: Mar 08, 2016
Determining which model works best for your organization means understanding the following requirements: Technical: Can the workload actually be hosted in the cloud? Compliance: Regulation may determine where and how their data and workloads can be run and stored. Security: Each workload has separate security requirements, creating challenges to run in the public cloud.
Tags : cloud model, public cloud, diy cloud, hybrid cloud, rackspace, compliance, cloud security
     Rackspace
By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
     AWS
By: AWS     Published Date: Jul 16, 2019
Ypsomed is a leader in the development and manufacturing of injection and infusion systems. The company is keenly aware of the multi-billion dollar problem of poor medication adherence and the need to measure medicine intake and ensure doses are taken at the correct time. Ypsomed sought to create a digital solution for medication adherence monitoring and smart device management for contract research organizations’ (CROs) use in clinical trials, including self-injection systems for trial participants to administer medications at home. Yet the company faced serious demands for remote device management, global scale, and privacy and security regulations such as HIPAA and GDPR. To solve these challenges, Ypsomed adopted Philips’ HealthSuite digital platform (HSDP), a cloud platform built on Amazon Web Services (AWS). HSDP allows Ypsomed to connect devices to the cloud and remotely manage them; store data; and manage and scale services globally within healthcare regulatory, privacy, and s
Tags : 
     AWS
By: RSA     Published Date: Sep 19, 2017
The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.
Tags : gdpr, data protection, rsa, rsa security, personal data, privacy
     RSA
By: SAP     Published Date: Aug 17, 2010
Most organizations find managing risk and compliance a challenge - but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise - and protect both corporate performance and reputation.
Tags : sap, risk, regulation, grc, risk, compliance, governance, erm, enterprise risk management
     SAP
By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : privileged user activity, enterprise compliance, security, third party access, it environment
     Centrify Corporation
By: IBM     Published Date: Nov 19, 2014
Risk Management: Algo Collateral: Evolution for efficiency - Active Collateral Management
Tags : ibm, efficiency, collateral management, risk management, financial landscape, financial transactions, otc market, financial regulation, business management
     IBM
By: BlackBerry Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : data, gdpr, global, nationally, cybercriminals
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : safe, lite, cybersecurity, data
     BlackBerry Cylance
By: SAS     Published Date: Jun 06, 2018
Some organizations focus on the scary aspects of failing to comply with the EU General Data Protection Regulation. But there are many long-term benefits of following through with plans for sustainable GDPR compliance – such as gaining a competitive edge, or developing new products or services. To learn how organizations have approached compliance efforts, SAS conducted a global survey among 183 cross-industry businesspeople involved with GDPR. Based on the results, this e-book delves into the biggest opportunities and challenges faced. Read the e-book to: • Get advice from industry experts. • Find out what steps peers have taken. • Learn how an integrated approach from SAS can continue to guide your journey.
Tags : 
     SAS
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com