data regulations

Results 101 - 109 of 109Sort Results By: Published Date | Title | Company Name

eBook: Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS Compliance

Published By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology, access control, application security, compliance
    
Rapid7

NetApp and the General Data Protection Regulation

Published By: NetApp     Published Date: Mar 05, 2018
Read this comprehensive guide to the General Data Protection Regulation and learn how to comply with new regulations and address business implications, establish a holistic data compliance strategy and better manage your data through the lens of data privacy by design.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

Big data Opens the Door for Prescriptive Analytics

Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
    
FICO

How to Comply with HIPAA and Affordable Care Act B2B/EDI Regulations

Published By: IBM     Published Date: Jul 22, 2016
You’ll learn: - About the mandates that will significantly increase transaction complexity and transaction volumes for payers and providers - How to reduce costs and improve processing efficiencies while also decreasing the risk associated with data movement - Ways to improve customer service and ensure compliance with evolving regulations while reducing IT operating expenses
Tags : 
ibm, healthcare, affordable care act, b2b, hipaa, edi regulations, knowledge management, enterprise applications, business technology
    
IBM

Satisfy That Android Sweet Tooth: Making It Work For Your Enterprise

Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM

Understanding Your Cybersecurity Posture

Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO

GDPR Compliance: How Can You Adapt To the New Regulation?

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA

GDPR tips: Keep your content safe in the cloud

Published By: Box     Published Date: Jun 22, 2018
With GDPR looming large on the horizon in May 2018 and beyond, there are a number of myths and misunderstandings circulating around the upcoming changes to compliance and data protection. In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system, and delve into topics, like: • GDPR strategies for cloud ECM • Cultural changes for upcoming compliance regulations • Projected fines associated with GDPR • And more
Tags : 
    
Box

Technology Industry Spotlight - Video Case Study

Published By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Start   Previous    1 2 3 4 5     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.