sanction

Results 1 - 25 of 30Sort Results By: Published Date | Title | Company Name

Transformation story: New brain power for high-volume transaction screening

Published By: KPMG     Published Date: Jun 06, 2019
High-volume administrative tasks are a feature of every business. We helped a global bank develop a machine learning algorithm to help with the task of reviewing over 100,000 ‘sanctions alerts’ every day. Read this story to find out: • what other benefits AI can deliver beyond cost savings • how AI tools achieve greater accuracy than human reviewers • what it takes to apply AI and Machine Learning successfully in a regulated sector.
Tags : 
    
KPMG

Webinar: Sanctions compliance after Brexit – be prepared

Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: • Details of current sanctions policy and post-Brexit implications • How financial and economic sanctions impact the private sector • How manage compliance better by using sanctions technology.
Tags : 
    
KPMG

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Oct 21, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

How to SYNC, Share & Control Data Security

Published By: Commvault     Published Date: Jul 06, 2016
Unsanctioned file sharing creates serious security and regulatory compliance issues. Read this infographic to learn how to sync, share and control data securely!
Tags : 
commvault, data security, protecting corporate data, commvault file sharing, virtual host costs, virtualization, networking, security
    
Commvault

Secure use of cloud apps & services

Published By: Symantec     Published Date: Jul 31, 2017
Every organization uses cloud apps, sanctioned or unsanctioned by IT.
Tags : 
cloud, cloud applications, security, threat and vulnerability management
    
Symantec

MobileIron Access One Pager

Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron

Japanese - MobileIron Access One Pager

Published By: MobileIron     Published Date: Nov 16, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data. Download the one pager now to learn more.
Tags : 
    
MobileIron

Be Afraid of Your Shadow: What Is Shadow IT and How to Reduce It

Published By: Globalscape     Published Date: Nov 14, 2016
Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is “no,” then your sensitive data may be vulnerable. In this guide from Globalscape, you’ll learn: • What shadow IT is and the drawbacks • Signs of a shadow IT problem • How to reduce shadow IT
Tags : 
globalscape, shadow it, data transfer methods, data breach, security, enterprise applications, business technology
    
Globalscape

Mitigating the Risk and Exposure of Cloud Services

Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions

Breaking Bad: The Risks of Unsecure File Sharing

Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks

Real-Time AML: The Technology Is Ready, but Is the Industry?

Published By: Fiserv     Published Date: Sep 14, 2017
Sanctions screening and fraud prevention solutions use real-time detection to prevent terrorist financing and financial crime; whereas anti-money laundering (AML) primarily follows an “observe and report” process. Such a process is all that is currently required by many regulators. Increasingly though, international compliance teams are choosing to stop transactions before they are executed – based on suspicions of money laundering activity. More and more, the industry has been asking itself if this approach of rejecting suspicious activity is a more effective strategy to prevent money laundering. This paper explores where and why AML real-time detection might make sense as a new paradigm for global financial institutions.
Tags : 
aml, anti-money laundering, compliance, regulatory compliance, financial crime, financial crimes, financial action task force, fatf
    
Fiserv

Do More with Complete Mobile-Cloud Security from MobileIron Access

Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron

Breaking Bad: The Risks of Unsecure File Sharing

Published By: Intralinks     Published Date: Aug 28, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations.
Tags : 
security, it management, knowledge management, data management, business technology
    
Intralinks

IAM without Compromise

Published By: OneLogin     Published Date: Oct 24, 2017
Enterprises of all sizes are challenged to effectively provide secure access to a rapidly growing mosaic of cloud, on-premise and mobile applications. Whether sanctioned by the enterprise IT group of purchased by departmental shadow IT organizations, individually provisioned applications present a great management burden with multiple negative operational effects: • Time and money wasted by manual on-and off-boarding, and lost passwords. • Security risk from weak, easy-to-remember passwords, as well as from system access by former employees whose credentials are not promptly revoked. • Lack of visibility into who accesses which application, and from where. As a result, enterprises and users encounter a range of obstacles that prevent them from securely operating at speed. At best, users who clamor for access to applications are inconvenienced when they don’t get access quickly enough, or not at all. Worst case, because today’s IT footprint is large and porous, companies face headline-m
Tags : 
    
OneLogin

Exposing Shadow IT in the Enterprise

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Uncover and block unsanctioned apps across your enterprise with App Discovery and blocking by Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Sep 10, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

The Importance of Choosing the Right CASB Solution

Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint

Secure Your Office 365 Environment With Forcepoint

Published By: Forcepoint     Published Date: Jun 06, 2019
Learn how Forcepoint Solutions can help you successfully adopt Office 365 and protect your entire cloud environment Driving Office 365 adoption is an important goal—87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance, and poor user experience caused by network architecture limitations and constraints. Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite. Enhance Microsoft's integrated cloud security and regain visibility and protection against advanced attacks and data loss Extend compliance consistently into the Microsoft ecosystem and beyond Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to t
Tags : 
    
Forcepoint

ESG Lab Validation: Forcepoint CASB

Published By: Forcepoint     Published Date: Jun 06, 2019
Office 365, Salesforce, and other cloud apps deliver a boost in employee productivity, but this benefit comes at a price. Once data moves outside an enterprise, security teams lose visibility and control into how it’s accessed and used. There is also the risk of unsanctioned apps or Shadow IT – the cloud apps setup and managed outside of IT that they have no visibility of; all this leaves an organization having to manage up to 1,000 cloud apps*.  Deploying a CASB solution can help you discover and assess risk from unsanctioned cloud apps and control sanctioned cloud app use. Through a hands-on evaluation, ESG discovered that Forcepoint CASB: Reduces threat response times Grants visibility and context into user activity Controls user access to cloud apps from different locations/devices Read the ESG evaluation for rare insight into Forcepoint CASB by a respected third-party analyst.
Tags : 
    
Forcepoint

15 Ways to Weed the Regulatory Violations Out of Your Spend

Published By: AppZen     Published Date: Aug 02, 2019
Spend-related regulatory violations come in the form of different types of payments or gifts, including those to sanctioned organizations or people; debarred organizations or people; organizations or people on an export control list; foreign officials or government-owned entities; politically-exposed people; and healthcare professionals or organizations. How do you know if you have these violations hiding in your organization's expenses, contracts, or invoices? It’s not easy to weed them out, and if you don’t have an automated, systematic approach, doing so is prohibitively time consuming.
Tags : 
    
AppZen

Practical business content collaboration: Personal tools show the way

Published By: YouSendIt     Published Date: Feb 04, 2012
Download this complimentary report and learn about the overwhelming number of business managers using an application or service that is not sanctioned by IT.
Tags : 
yousendit, manufacturing, email maketing, ecommerce, healthcare, business managers, email, marketing
    
YouSendIt

The OFAC 50% Rule: When Government Lists Are Not Enough

Published By: Factiva     Published Date: Dec 01, 2015
When compliance managers think about the good old days, they do not have to look back too far. In fact, prior to 2008, the world was a much simpler place: the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) published a list of sanctioned companies and individuals, and as long as their company was not doing business with any person on that list, they seemed to be in good shape. This was definitely not an easy task. However, after 2008, it became more complicated when OFAC guidance stated that an ownership interest of 50% or more by a sanctioned subject was blocked or otherwise limited.
Tags : 
compliance, ofac, sanction
    
Factiva

2015 IT Communications Buyers Guide: What to Look (out) for from an Enterprise-Grade Solution

Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution, networking
    
xMatters

Pervasive Data Protection

Published By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : 
data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility
    
McAfee

Breaking Bad: The Risks of Unsecure File Sharing

Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications, business technology
    
Intralinks
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.