compliance

Results 1901 - 1925 of 2045Sort Results By: Published Date | Title | Company Name

Trends In The Cost Of Web Application & Denial Of Service Attacks

Published By: Akamai Technologies     Published Date: May 07, 2018
We are pleased to present the Cost of Web Application and Denial of Service Attacks, sponsored by Akamai Technologies. The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks since the study was first conducted in 2015. For this study, Ponemon Institute surveyed 621 individuals in IT operations, IT security, IT compliance or data center administration.
Tags : 
web, application, attacks, security, akamai, technology
    
Akamai Technologies

Tripwire and 21 CFR11: Ensuring Integrity and Trustworthiness of Electronic Clinical Data

Published By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : 
tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness, fda, solutions, solution, electronic systems, hipaa, policy, requirements, electronics, hipaa compliance, data quality, database security
    
Tripwire

Tripwire Log Center: Next Generation Log & Event Management

Published By: Tripwire, Inc     Published Date: Mar 10, 2010
The next generation of log and event management eliminates the complexity and bloat associated with traditional log and SIEM systems.
Tags : 
tripwire, log center, event management, siem system, compliance regulation, security event analysis platform, event database, integrated it security, automation, business continuity, compliance, internet security, application integration, business process automation
    
Tripwire, Inc

Tripwire's Solutions for Automated, Continuous PCI Compliance

Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management, security management, configuration management
    
Tripwire, Inc

Tripwire's Solutions for Automated, Continuous PCI Compliance

Published By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : 
tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center, pci dss, compliance, internet security, business process automation
    
Tripwire, Inc

Trust but verify.managing and auditing privileged users

Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati, application security, auditing, compliance, identity management
    
IBM

Trusted Identities: A Tool in Your European GDPR Compliance Toolbox

Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard

Turkcell (Turkey) Case Study (Operations Automation)

Published By: HP     Published Date: Apr 13, 2014
Cut the cost and complexity of managing you large, hybrid server estate. Learn how Turkcell, the leading GSM operator in Turkey, reaps benefits from server automation including reductions in the time needed to check adherence to security compliance policies from 55 hours to 20 minutes and cutting the time taken to provision virtual PCs from five days to 40 minutes.
Tags : 
hp operations orchestration, hp server automation, hp support, it case study, turkcell, bsm, business service management, networking, it management, enterprise applications
    
HP

Turn GDPR To Your Advantage

Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning
    
Selligent Marketing Cloud

Turn Mandated Training into Engaging eLearning

Published By: Absorb     Published Date: May 10, 2018
In a business environment where being able to build and maintain a solid brand reputation and lasting relationships with your customers is essential for ongoing success, effective compliance training for team members is critical. Assembling quality course content, either through purchasing off-the-shelf compliance courseware or developing training material in-house or in partnership with an external developer, and delivering that material in a consistent manner, can help protect your organization and minimize the damage from compliance transgressions.
Tags : 
elearning, training, business, brand, reputation, relationship, building
    
Absorb

UE General Data Protection Regulation (GDPR)

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Tenuto conto del fatto che la GDPR è stato annunciato formalmente solo di recente, si evidenzia un buon livello di consapevolezza tra i partecipanti. Una volta informati sul regolamento, l'88% degli intervistati ha dichiarato che la propria azienda deve affrontare difficoltà tecnologiche per la compliance alla GDPR. Il percorso verso la compliance è percepito come molto laborioso.
Tags : 
generazione di dati sintetici, virtualizzazione di servizi, controllo e protezione dei database, masking dei dati, warehouse dei dati, ca technologies, gdpr
    
CA Technologies EMEA

UK - Government Connect Secure Extranet (GCSx)

Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm

Ultimate Guide to Learning

Published By: SilkRoad Technology     Published Date: Feb 24, 2016
It’s a new day for corporate training and those who manage learning functions. Today, traditional training programs aren’t enough to meet growing demands for better company performance, consistent compliance, changing employee expectations, and cost control.
Tags : 
silkroad, human resources, learning, development
    
SilkRoad Technology

Understand and React to Policies Assigned to Your Assets

Published By: ITinvolve     Published Date: Apr 16, 2013
Most assets in IT are governed by one or more policies, yet there is usually no quick and easy method to determine which policies apply to which assets and what specifically those policies govern. This means that IT teams are often making changes to assets that violate the policies meant to govern them. Read this use case document to understand how social knowledge collaboration techniques can help you to easily assign and track the policies that govern your assets to avoid out of compliance situations.
Tags : 
itinvolve, policies, it teams, compliance situations, social knowledge collaboration, techniques
    
ITinvolve

Understanding and Managing Security Audits

Published By: Ecora Software     Published Date: Aug 15, 2007
Better preparation means better results – Learn how to prepare for an audit; how to develop a self-audit process; how to develop a security template; and much more.
Tags : 
security audit, audit, auditing, vulnerability assessment, vulnerability management, infrastructure, patch, patch management, compliance, holes, security holes, ecora
    
Ecora Software

Understanding Business Ethics and Integrity

Published By: Skillsoft     Published Date: May 19, 2015
This report focuses on the consumers perspective in relation to understanding business ethics and integrity.
Tags : 
business ethics and integrity, compliance programs, skillsoft, employee training software
    
Skillsoft

Understanding RoHS and REACH: Impacts on your Global Markets

Published By: SiliconExpert Technologies     Published Date: Feb 08, 2011
An overview of two important environmental regulations, their impacts on the global electronics industry and upcoming legislation changes.
Tags : 
reach, rohs, environmental compliance, environmental regulation, electronic part, boms
    
SiliconExpert Technologies

Understanding the Basics of FAR and CAS

Published By: Deltek     Published Date: Sep 26, 2019
Still unraveling the mystery that is Federal Acquisition Regulation (FAR) and Cost Accounting Standards (CAS) compliance? The exemptions, standards and disclosures can often feel like a puzzle never to be solved. Until now. Get the basics of the “allocability” and “allowability” that define FAR and CAS adherence and keep the momentum of your government business moving forward. Learn: Definitions of when and to what extent government contract costs can be recovered Accounting system edicts and standards Cost-specific mandates and need-to-knows Why timing is everything in keeping compliant.
Tags : 
    
Deltek

Understanding the Impact of Comprehensive Data Security

Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA

Unified Governance & Integration: The foundation for insights and compliance

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Across enterprises of all kinds, data is multiplying rapidly in both quantity and variety. Across multi-cloud environments, new sources are exponentially increasing the growing stream of information, including the Internet of Things, social media, mobile devices, virtual reality implementations and optical tracking.
Tags : 
    
Group M_IBM Q418

Unified Planning and Consolidation: A Wise Investment for Mid-sized Companies

Published By: SAP     Published Date: Apr 13, 2011
In today's heightened competitive and regulatory environment, an organization's fortunes can rise or fall based on the effectiveness of its financial systems, particularly those that drive its performance management. Organizations today are looking to optimize these systems, at the core of which are financial consolidation and planning.
Tags : 
unified planning, bpm partners, performance management application, procurement, deployment, data quality, risk and compliance, lob, financial application, business process automation, business process management, financial management
    
SAP

Unifying Data Protection with McAfee

Published By: McAfee     Published Date: Mar 31, 2017
The widespread adoption of cloud services has resulted in sensitive data assets being stored in cloud services. This solution brief takes a deep dive of McAfee’s unified approach to data security that protects both on premise and cloud-resident data from loss and to meet and maintain compliance
Tags : 
unified data protection, data protection, cloud adoption, cloud vsibility, cloud data protection, cloud access security broker, shadow it
    
McAfee

Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows

Published By: IBM     Published Date: Jun 02, 2009
Linux reliability has come of age. Several major Linux distributions including Novell SUSE, Red Hat Enterprise Linux and Ubuntu scored high in reliability, improved over 2006 uptime statistics and achieved near parity with Unix distributions. Security incidents plagued Windows Server 2003, which saw uptime decrease by roughly 10% during last year. Corporations must continue to adhere to best practices in configuration, management and security to ensure optimal server operating system and application reliability.
Tags : 
reliability, uptime, performance, management, service-level agreement, sla, compliance, linux, unix, ibm, red hat enterprise linux, rhel, ubuntu, debian, real-time resources, smbs, small and medium businesses, operating system, total cost of ownership, tco
    
IBM

Unlocking Content with AI to Power Business Transformation

Published By: Box     Published Date: Jul 29, 2019
Most CIOs today understand that digital transformation initiatives can help streamline business process; boost ef?ciency; increase competitiveness; and, broadly, help their organization become disruptive over the long term. Some of the transformation initiatives under way—even in many pace-setting companies—are struggling to manage the exponential explosion of unstructured data and the associated heightened compliance and security demands, however. Fortunately, new solutions that tap arti?cial intelligence (AI) can extract hidden insights from unstructured data, such as documents, images, videos, and audio ?les. AI is also helping automate many of the labor-intensive processes used to classify, organize, and analyze unstructured content
Tags : 
    
Box

Unprecedented Technological Trends Push the Envelope in Life Sciences

Published By: Cognizant     Published Date: Oct 23, 2018
A group of emerging technologies is rapidly creating numerous opportunities for life sciences companies to improve productivity, enhance patient care and ensure regulatory compliance. These technologies include robotic process automation (RPA), artificial intelligence (AI), machine learning (ML), blockchain, the Internet of Things (IoT), 3-D printing and augmented reality/ virtual reality (AR/ VR). This whitepaper presents a preview of five pivotal technology trends remaking the life sciences industry: AI and automation, human augmentation, edge analytics/ processing, data ownership and protection, and the intermingling of products and services.
Tags : 
cognizant, life sciences, patient care
    
Cognizant
Start   Previous    68 69 70 71 72 73 74 75 76 77 78 79 80 81 82    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.