governance

Results 1 - 25 of 492Sort Results By: Published Date | Title | Company Name
By: KPMG     Published Date: Oct 15, 2019
We’re seeing a global trend towards responsible investing. Increasingly, institutional investors are recognising the potential for ESG factors to affect the valuation and financial performance of the companies they invest in. At the same time, consumer demand for responsible investments is surging, especially from the younger generation. “Responsible” or “sustainable” finance and a focus on environmental, social and governance (ESG) factors have moved firmly into the mainstream today. This booklet presents the proof to address the issues around responsible investment implementation: statistics from across investment markets that show how significant this shift is.
Tags : 
     KPMG
By: KPMG     Published Date: Oct 15, 2019
Around the globe, voices clamoring for climate-aware investing and carbon controlsare increasing. Demand for ethical treatment of employees, customers and other stakeholders is also growing, as is indignation about poorly-managed companies. Companies are subject to an increasing set of non-financial reporting requirements relating to environmental, social and governance (ESG) factors. A swathe of new requirements will soon impact the investment and lending appetites of EU financial institutions. Coupled with increasing investor demands, these new rules could have a profound impact on companies’ ability to raise capital, within the EU and beyond.
Tags : 
     KPMG
By: SailPoint Technologies     Published Date: Oct 15, 2019
Did you know the basic security that comes with AWS access management just isn’t enough? Find out why you need identity governance to create a secure and compliant environment for Amazon Web Services (AWS) accounts and DevOps users.
Tags : 
     SailPoint Technologies
By: MuleSoft     Published Date: Oct 10, 2019
Many businesses are now considering various options as they migrate to SAP S/4 Hana. Numerous organizations rely on SAP platform solutions, many of which were implemented during the late 1990s and early 2000s. By 2025, SAP will end mainstream maintenance on all instances of ERP installations forcing enterprises to migrate to SAP S/4HANA, or re-implement complex ERP installations, which can come with many challenges. Read this whitepaper, written in collaboration with Capgemini, to learn: How to prove the business value of a migration to SAP S/4HANA. Why an API-led architecture is the best approach for SAP S/4HANA integration with existing systems, providing agility and shielding an organization’s technology stack from future changes to other systems. The main principles of a Center for Enablement (C4E) and how it enables enterprises to implement software design with governance and high delivery speeds.
Tags : 
     MuleSoft
By: Veeam '18     Published Date: Oct 10, 2019
60% dei dati cloud sensibili è conservato all'interno di documenti Office e per il 75% di questi dati NON viene eseguito un backup! In questo breve e semplice report, gli analisti di 451 Research spiegano perché è importante eseguire il backup dei dati di Office 365. I risultati più importanti includono: I dati di Office 365 sono i nuovi dati aziendali d’importanza critica Il fatto che i dati SaaS siano intrinsecamente sicuri è un luogo comune Ripristini e governance stanno diventando tanto importanti quanto il backup dei dati La protezione dei dati sarà sempre più legata alle problematiche legali e di conformità.
Tags : 
     Veeam '18
By: Veeam '18     Published Date: Oct 10, 2019
60% dei dati cloud sensibili è conservato all'interno di documenti Office e per il 75% di questi dati NON viene eseguito un backup! In questo breve e semplice report, gli analisti di 451 Research spiegano perché è importante eseguire il backup dei dati di Office 365. I risultati più importanti includono: I dati di Office 365 sono i nuovi dati aziendali d’importanza critica Il fatto che i dati SaaS siano intrinsecamente sicuri è un luogo comune Ripristini e governance stanno diventando tanto importanti quanto il backup dei dati La protezione dei dati sarà sempre più legata alle problematiche legali e di conformità.
Tags : 
     Veeam '18
By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
     AWS
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
     F5 Networks Singapore Pte Ltd
By: Ricoh     Published Date: Sep 17, 2019
We do business in the age of information. The amount of data, the number of sources, the uses for data, and the routes that it travels have all been growing at an exponential rate. The importance of managing, securing, sharing and measuring information is the core of Information Governance. IG enables organizations to extract the value of information to make better business decisions, but how to go about the massive task is harder to grasp.
Tags : 
     Ricoh
By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
i. Brief – US based automobile had no asset management and CMDB discovery which lead to longer procurement lifecycles. LTI implemented end to end ServiceNow and operational support using global delivery model. Also helped in optimising integrations after reviewing license consumptions which then helped in reducing the process implementation to mere 2.5 months ii. Benefits 1. Hybrid process governance helped reduction in TCO by 25% 2. Reduction in number of licenses by 20% using integration with SharePoint
Tags : application management, artificial intelligence, b2b technology, cloud applications, cloud architect
     Larsen & Toubro Infotech(LTI)
By: Avetta     Published Date: Sep 17, 2019
A new NPR/Marist poll reveals that one in five jobs in the U.S. is held by a worker under contract. In fact, independent contractors could make up half of the entire workforce in the U.S. within the next decade. More and more organizations have begun to see contractors and suppliers as valuable business partners intrinsic to driving service and product innovation. For many companies, especially those operating in highly regulated industries, managing compliance in-house for all of these suppliers can be burdensome. But the cost of non-compliance — in the form of penalties, fines, productivity losses, settlement costs, and inefficiencies — is ruinous. This white paper will discuss: • The hidden costs of ignoring contractor management • Best practices towards holistic compliance and governance • The cost of different contractor management systems • How to get the highest ROI in your supply chain
Tags : 
     Avetta
By: Gigaom     Published Date: Sep 16, 2019
We’ve heard it before. A data warehouse is a place for formally-structured, highly-curated data, accommodating recurring business analyses, whereas data lakes are places for “raw” data, serving analytic workloads, experimental in nature. Since both conventional and experimental analysis is important in this data-driven era, we’re left with separate repositories, siloed data, and bifurcated skill sets. Or are we? In fact, less structured data can go into your warehouse, and since today’s data warehouses can leverage the same distributed file systems and cloud storage layers that host data lakes, the warehouse/lake distinction’s very premise is rapidly diminishing. In reality, business drivers and business outcomes demand that we abandon the false dichotomy and unify our data, our governance, our analysis, and our technology teams. Want to get this right? Then join us for a free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guest, Dav
Tags : 
     Gigaom
By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Sep 05, 2019
Find out how combining identity governance with privileged account management significantly decreases security risks and improves productivity. Download the brief.
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Sep 05, 2019
Short Description (1000 characters max) Want the strongest cybersecurity possible? Download this brief to find out how Identity governance, combined with privileged access management, will give you the information you need to quickly identify and respond to security risks.
Tags : 
     SailPoint Technologies
By: Dataguise     Published Date: Aug 20, 2019
Co-presented by Dataguise and Amazon Web Services (AWS), this webinar looks at ways this highly regulated industry uses cloud-based technology to manage data governance and data privacy compliance across multiple services within AWS, including S3, RDS, Aurora, and Redshift. This is especially important given new data privacy laws set forth by the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA) of 2018. You’ll learn specific steps to take toward successful data privacy compliance.
Tags : 
     Dataguise
By: SailPoint Technologies     Published Date: Aug 02, 2019
Don’t risk severe financial penalties from CCPA non-complance. Download this brief to find out how to protect your customer data with SailPoint identity governance.
Tags : 
     SailPoint Technologies
By: SailPoint Technologies     Published Date: Aug 02, 2019
Find out how cloud identity governance cost-effectively reduces security and compliance risk, while also providing timely access to information. Download the brief.
Tags : 
     SailPoint Technologies
By: Larsen & Toubro Infotech(LTI)     Published Date: Jul 11, 2019
US-based multinational financial services corporation was facing a longer time-to-market due to hampering of digital transformation across business lines, thereby affecting the developer productivity due to global manual build and deployment processes. LTI’s approach of providing end-to-end implementation of DevOps, with quality control gates, helped establish a role-based governance dashboard for real-time health KPIs of programs, projects, and tracking server positioning and the configuration status. Download full case study
Tags : 
     Larsen & Toubro Infotech(LTI)
By: SAS     Published Date: Jun 27, 2019
In the quest to understand how a therapeutic intervention performs in actual use – in real medical practice outside the controlled environment of clinical trials – many life sciences organizations are stymied. They rely on one-off processes, disconnected tools, costly and redundant data stores, and ad hoc discovery methods. It’s time to standardize real-world data and analytics platforms – to establish much-needed consistency, governance, repeatability, sharing and reuse. The organizations that achieve these goals will formalize their knowledge base and make it scalable, while significantly reducing turnaround times, resources and cost. Learn the seven key components for putting that structure to real-world evidence – and four ways to take it to the next level.
Tags : 
     SAS
By: Group M_IBM Q3'19     Published Date: Jun 27, 2019
Organizations continue to rush down the digital transformation path. Whether by modernizing their IT infrastructures, leveraging the cloud, or becoming data-centric and data-driven, organizations must become more agile in their business practices and within their IT infrastructure stack to effectively compete in today’s dynamic business environment. Between the speed and distributed nature of modern businesses, as well as the expectation of instantaneous access to data from everyday users, it’s not surprising that nearly one in three organizations are looking into ways to improve data analytics for real-time business intelligence and customer insight.
Tags : 
     Group M_IBM Q3'19
By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
     SailPoint Technologies
By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
     Forcepoint
By: SailPoint Technologies     Published Date: May 22, 2019
Moderne Unternehmen sind stärker vernetzt und anfälliger für Sicherheitsbedrohungen. Lernen Sie die sechs wichtigsten Gründe kennen, warum Identitäts-Governance zum Schutz von Unternehmen jeder Größe beitragen kann.
Tags : 
     SailPoint Technologies
By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
US-based multinational financial services corporation was facing a longer time-to-market due to hampering of digital transformation across business lines, thereby affecting the developer productivity due to global manual build and deployment processes. LTI’s approach of providing end-to-end implementation of DevOps, with quality control gates, helped establish a role-based governance dashboard for real-time health KPIs of programs, projects, and tracking server positioning and the configuration status. Download full case study
Tags : 
     Larsen & Toubro Infotech(LTI)
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com