regulator

Results 201 - 225 of 517Sort Results By: Published Date | Title | Company Name

Managing Regulatory and Compliance Requirements with a Quality Management Tool and Process

Published By: IBM     Published Date: Jun 22, 2015
This webcast will highlight a major healthcare organization’s journey to implement better quality management approaches that impact its ability to achieve compliance for regulatory requirements. Learn how certain practices can reduce complexity and improve traceability and collaboration.
Tags : 
ibm, compliance requirements, quality management tools, quality management, best practices, software development, it management, knowledge management, data management
    
IBM

Successful healthcare analytics begin with the right data blueprint

Published By: IBM     Published Date: Mar 30, 2016
This white paper discusses how enterprise analytics systems can assist provider organizations in building sustainable healthcare systems and achieving their vision for accountable care—from near-term demands for regulatory and quality reporting to transforming care delivery.
Tags : 
ibm, healthcare analytics, healthcare, big data, enterprise analytics systems
    
IBM

New from James Lam: The Next Evolution of ERM Is Here

Published By: IBM     Published Date: Jul 14, 2016
From its beginnings in the early 1990s to its present state, enterprise risk management (ERM) has experienced a significant transformation. Over the past three decades, ERM has evolved in response to a number of macroeconomic events, as well as multiple business and regulatory changes. We live in a new world that is now more volatile and uncertain than ever before. The speed of change and the velocity of risk have increased significantly. Download this white paper from ERM pioneer James Lam to learn how organizations can successfully evolve their ERM function. You'll explore the history of ERM and how events have shaped the current function in organizations, the next phase in its evolution of performance-based continuous ERM, and its seven key attributes.
Tags : 
risk management, best practices, evolution, business analytics, business intelligence, business management
    
IBM

The Future Of Data Security And Privacy: Growth And Competitive Differentiation

Published By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : 
ibm, security, data, privacy, forrester, forrester research, data management, business technology
    
IBM

Governing risk data aggregation and risk reporting

Published By: IBM     Published Date: Jul 26, 2017
The risk reporting environment for banks has changed. Regulatory imperatives that were largely driven by the financial crisis of 2007— such as Dodd-Frank, Principles for Effective Risk Data Aggregation and Risk Reporting (BCBS 239) by the Basel Committee on Banking Supervision (BCBS), Comprehensive Capital Analysis and Review (CCAR) and others—are impacting banks around the globe. These imperatives are forcing banks to rethink and reinvent how their systems integrate and how data from across the bank flows into the aggregated risk and capital reports required by regulatory agencies. Banks must be able to convey to agencies that the data is complete, correct and consistent in order to establish that the reports are trustworthy
Tags : 
risk mitigation, risk reporting, banking, data aggregation
    
IBM

Taking the pain out of regulatory compliance

Published By: IBM     Published Date: Jul 26, 2017
Fear of data misuse has led to both general and industry-specific data-privacy regulations worldwide that many organizations now must meet, and it’s important to embrace their requirements. The role of data-holding organizations has increasingly shifted to being stewards of information, in particular in the United States and the European Union (EU). And failure to comply with regulations can mean not only reputational damage, but substantial fines and even jail time. Just meeting compliance mandates, though, may not help you actively spot and stop a data breach.
Tags : 
data misuse, security, privacy regulations, data breach, compliance mandates
    
IBM

The Business Value of a Security Monitoring and Analytics Platform

Published By: IBM     Published Date: Jul 28, 2017
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure: To identify and assess security-related risks, and manage them to an acceptable level To achieve, sustain, and demonstrate compliance with policies and regulatory requirements To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.
Tags : 
information technology, information infrastructure, security risks, operation efficiency, operation flexibility
    
IBM

Governing risk data aggregation and risk reporting

Published By: IBM     Published Date: Aug 23, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive To keep pace with regulatory changes, many banks will need to reapportion their budgets to support the development of new systems and processes. Regulators continually indicate that the banks must be able to provide, secure and deliver high-quality information that is consistent and mature.
Tags : 
risk mitigation, data aggregation, risk reporting, banking
    
IBM

Governing risk data aggregation and risk reporting

Published By: IBM     Published Date: Oct 03, 2017
Many new regulations are spurring banks to rethink how data from across the enterprise flows into the aggregated risk and capital reports required by regulatory agencies. Data must be complete, correct and consistent to maintain confidence in risk reports, capital reports and analytical analyses. At the same time, banks need ways to monetize, grant access to and generate insight from data. To keep pace with regulatory changes, many banks will need to reapportion their budgets to support the development of new systems and processes. Regulators continually indicate that the banks must be able to provide, secure and deliver high-quality information that is consistent and mature.
Tags : 
data aggregation, risk reporting, bank regulation, enterprise, reapportion budgets
    
IBM

Finding the Path to Security in the Big Data Landscape

Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM

Governing Risk Data Aggregation and Risk Reporting

Published By: IBM     Published Date: Oct 17, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive (MiFID2). Many of these new regulations are spurring banks to rethink how data from across the enterprise flows into the aggregated risk and capital reports required by regulatory agencies. Data must be complete, correct and consistent to maintain confidence in risk reports, capital reports and analytical analyses. At the same time, banks need ways to monetize, grant access to and generate insight from data
Tags : 
    
IBM

Protect Users and Critical Data with Advanced Access Security

Published By: IBM     Published Date: Oct 26, 2017
Improper user access to applications can expose an organization to cyber attacks, with wide-ranging financial, social, public relations and legal implications for a compromised enterprise. To address these risks—and to meet regulatory requirements for authentication, data privacy and security—organizations sometimes find themselves wrestling with complex and costly access-management approaches.
Tags : 
critical data, access security, user experience, it strategy, identity federation
    
IBM

Taking the pain out of regulatory compliance

Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium can help take the pain out of regulatory compliance so that compliance can be a valuable tool and not a hassle.
Tags : 
ibm security, guardium, regulatory, compliance
    
IBM

Taking the pain out of regulatory compliance

Published By: IBM     Published Date: Apr 13, 2018
IBM Security Guardium can help take the pain out of regulatory compliance so that compliance can be a valuable tool and not a hassle.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM

LinuxONE: A Secure, Scalable Data-Serving Infrastructure Accelerates Digital Transformation

Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM

Protecting your company’s most critical information. Not all data is created equal

Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM

GDPR signals big data protection changes worldwide

Published By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
    
IBM

Digital Reinvention in Action

Published By: IBM APAC     Published Date: Aug 25, 2017
Digital technologies have altered how people and businesses interact. Digital forces have created unprecedented levels of industry dislocation and are fundamentally changing business economics. To succeed in this disruptive environment,organizations will need to offer compelling new experiences, establish new focus, build new expertise and devise new ways of working. Business leaders will face a stark choice: Either digitally reinvent their enterprises, or watch as their businesses decompose around them. Successful Digital Reinvention will involve a fundamental reimagining of how an organization operates and how it engages with its environment.
Tags : 
technology factors, market factors, macroeconomic, technological disruption, regulatory concerns, socioeconomic factors
    
IBM APAC

Express tape storage solutions from IBM

Published By: IBM Corp     Published Date: Sep 23, 2011
This solution brief discusses the backup and archive challenges that SMBs face and how tape storage solutions address regulatory compliance.
Tags : 
ibm, smb, backup, technology, data recovery, archive, security management, security policies, application integration, data protection, data quality, database security
    
IBM Corp

Data Security And Privacy Thought Leadership

Published By: IBM Corporation     Published Date: Oct 20, 2011
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk.
Tags : 
ibm, guardium, technology, data, security, privacy, risk reduction, internet security, intrusion prevention, security management, security policies, data protection, data quality
    
IBM Corporation

Mobile Device Management for Financial Services

Published By: IBM MaaS360     Published Date: Apr 15, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, financial services, application security, mobile computing, mobile data systems, mobile workers, business intelligence, web service management
    
IBM MaaS360

Mobile Device Management for Financial Services

Published By: IBM MaaS360     Published Date: Oct 08, 2015
With Mobile Device Management (MDM) iPhones, iPads and the slew of Androids on the market, you can meet the balance of open access for employees while ensuring adherence to regulatory compliance.
Tags : 
ibm, mobile, financial services, device management, android, iphone, regulatory compliance, networking, security, business technology
    
IBM MaaS360

Secure Network Access for Contractors, Business Partners and Guests

Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication, local area networking
    
Identity Engines
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.