it standard

Results 201 - 225 of 706Sort Results By: Published Date | Title | Company Name

OAuth – die fünf wichtigsten Aspekte für API Access Control

Published By: CA Technologies     Published Date: Aug 24, 2017
Mit OAuth kann der Benutzer den Zugriff an eine API delegieren. So kann für diesen Benutzer ein Service in einen anderen integriert werden. Die gleichen Social Web-Anbieter, die dafür gesorgt haben, dass APIs verfügbar gemacht werden, damit externe Entwickler ihre Plattformen optimieren können, waren auch die ersten, die solche Mechanismen für die delegierte Autorisierung angewendet haben. OAuth wurde im Jahr 2006 definiert, um derartige Mechanismen zu standardisieren.
Tags : 
    
CA Technologies

Achieving a Unified Governance Strategy

Published By: IBM     Published Date: Aug 24, 2017
Data governance is all about managing data, by revising that data to standardize it and bring consistency to the way it is used across numerous business initiatives. What’s more, data governance ensures that critical data is available at the right time to the right person, in a standardized and reliable form. A benefit that fuels better organization of business operations, resulting in improved productivity and efficiency of that organization. Thus, the importance of proper data governance cannot be understated. The concepts of data governance have evolved, where the first iteration of data governance, often referred to as version 1.0, focused on three simplistic elements: objectives, structure and processes; having a limited focus and scope due to its tactical usage. The opportunity from the growing value of data in the realm of analytics, business intelligence, and generating insights was left unrealized. Today, organizations are moving towards what can be called Data Governance 2.0,
Tags : 
ibm, unified governance strategy, data management, data governance
    
IBM

The Payment Card Industry Data Security Standard and CA Privileged Access Management

Published By: CA Technologies     Published Date: Aug 22, 2017
The Payment Card Industry Data Security Standard (PCI DSS) was first introduced in 2004 to increase controls over credit card holder data and to reduce the chances of credit card fraud. Validation is required annually and over the years, it has evolved with new revisions periodically. The latest one, version 3.2 came into force in April 2016. Until the end of January 2018, PCI DSS and Payment Application Data Security Standards (PA-DSS) are considered best practice to implement, and starting February 1, 2018, are considered a requirement.
Tags : 
    
CA Technologies

5 OAuth Essentials for API Access Control

Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
    
CA Technologies

IBM MaaS360 with Watson

Published By: IBM APAC     Published Date: Aug 22, 2017
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
actionable insights, contextual analytics, applications, content, data, identity, threats, connectivity
    
IBM APAC

Virtualizing the Evolved Packet Core (vEPC)

Published By: Intel     Published Date: Aug 17, 2017
Communications service providers are looking for alternative deployment models that will help them support fast-growing network demand. Moving to a virtualized EPC (vEPC) solution can help service providers achieve more cost-e?ective scaling by using standard high-volume servers in place of purpose-built systems. System integrators, software vendors, and platform providers rely on Intel® technologies to deliver the performance and scalability required for vEPC solutions. Intel is also participating in the development of open standards, contributing to the open source community, developing reference architectures, engaging with industry participants, and collaborating on trials that can help facilitate the evolution to vEPC solutions and accelerate network transformation by use of network functions virtualization.
Tags : 
    
Intel

The GDPR Playbook: Discover, Plan, and Act On The Upcoming EU Data Protection Regulation

Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint

The Complete API Strategy Model For The Enterprise

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA API Management is a robust, enterprise-grade solution that can enable the success of your API initiatives. The software provides industry-leading tools to rapidly create APIs from existing data assets, orchestrate legacy services and safely expose enterprise applications and services. The solution also allows you to quickly onboard, manage and enable the developers who will create innovative apps that add value to your business. And, just as importantly, CA API Management secures your enterprise data to meet the toughest compliance and regulatory standards, while providing you with full control over which apps, developers and partners can access your APIs.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA

GDPR Compliance: How Can You Adapt To the New Regulation?

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA

How EMM Helps with GDPR Compliance

Published By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
data security, regulation, legal system, data protection
    
MobileIron

How EMM Helps with GDPR Compliance

Published By: CBRE     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
    
CBRE

Turn Your Shop Floor Into a Strategic Business Driver

Published By: Epicor     Published Date: Aug 01, 2017
Like many manufacturers, your shop floor operations may be challenged with inefficient standard processes, unpredictable downtime, and difficulties with machinery maintenance. A manufacturing execution system (MES) can help make the most of your shop floor’s capabilities, with tools that can identify under-performing and high-performance machines, and then optimize asset utilization accordingly. Engineers can design, refine, and implement better work processes, and operations professionals can improve preventive maintenance and response times. The result is less downtime, less scrap, more productivity, and lower cost. With the real-time information of an MES, you can transform the shop floor into an important contributor that drives the strategic direction of your business, differentiates your brand, and positions your company as a market leader.
Tags : 
enterprise resource planning (erp), manufacturing execution system (mes), manufacturing, mattec mes
    
Epicor

The Rise of Machine Learning (ML) in Cybersecurity

Published By: CrowdStrike     Published Date: Aug 01, 2017
While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology —what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution,it dramatically increases your ability to detect attacks that use unknown malware. Download this white paper to learn:?How different types of ML are applied in various industries and why it’s such an effective tool against unknown malware?Why ML technologies differ and what factors can increase the accuracy and effectiveness of ML ?How CrowdStrike’s ML-based technology works as part of the Falcon platform’s next-generation AV
Tags : 
    
CrowdStrike

Your Complete Guide to Modern Finance

Published By: Oracle     Published Date: Jul 31, 2017
For finance organizations, the challenge of keeping up with systemic change should be viewed as an opportunity to boldly leverage disruption rather than hunkering down in fear. Businesses that accept this challenge embrace new and leading technologies, standardize on best practices and invest in the next generation of financial software and their employees. This guide provides a clear path to modern finance that is well defined and ready to support your company’s success.
Tags : 
    
Oracle

Guard Your Organization's Data With Intelligent IBM Encryption

Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM

Secure Cloud Infrastructure

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"It is very well understood that Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements and remain competitive many companies are turning to cloud computing. Companies thus need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. Oracle understand the need for IT organizations to move to cloud computing at the same time also recognizes that moving to the cloud is a multi-step journey that starts with standardization and consolidation of IT infrastructure and ends by moving applications and data to the cloud. The PDF is meant to help you gauge through the Oracle’s SPARC servers and give you an experience of simplified journey to the cloud by using the same technology for both cloud and on-premises deployments. No matter where your IT organization is on the journey to the cloud SPARC servers will be an i
Tags : 
    
Oracle PaaS/IaaS/Hardware

Rolling Forecasts

Published By: Oracle     Published Date: Jul 12, 2017
In recent years, business forecasts have had to become faster and more flexible—ready to be adjusted at a moment’s notice. As earnings and product cycles accelerate, it has become clear that the business world is decisively moving towards treating rolling forecasts as standard. A slow process of budgeting and forecasting is no longer enough. This digibook contains a step-by-step guide on how to meet stakeholders’ expectations, with case studies and examples of how smart CFOs are adapting their processes to improve the quality and timeliness of their business forecasting.
Tags : 
forecast, digital transformation, digibook, cfo, process, case study
    
Oracle

7 Helpful Tips to Get Your Business in Shape

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Ever feel like it takes too long to do something that should be simple? Or feel like your work processes just have way too many steps? Don’t worry – help is here. Discover how you can improve your efficiency at work when you: Develop standard operating procedures to ensure accuracy, timeliness and customer satisfaction. Make collaboration easy and empowering. Streamline customer communications with clear schedules and touch points.
Tags : 
business efficiency, collaboration, customer communication, customer satisfaction
    
Citrix ShareFile

4 Ways Architects and Engineers Can Improve Client Relations (AEC)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : 
client relations, efficiency, file sharing, data tracking
    
Citrix ShareFile

Think Outside the Box: File Sharing for Architecture and Engineering Firms (AEC)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Functionality, cost effectiveness and efficiency drive your firm. Apply those standards to sharing large files if you want to beat competitors who use standard, less professional file-sharing tools with clients. Read this e-book to discover how you and your firm can: Avoid the unreliability and time-consuming limitations of FTP and email. Stop breaking up files and start tracking their status. Increase the speed of transferring proposals, specs and more without sacrificing security.
Tags : 
cost effectiveness, efficiency, data sharing, data security
    
Citrix ShareFile

The Payment Card Industry: Data Security Standard and CA Privileged Access Management

Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies

B2B Digital Trends

Published By: Adobe     Published Date: Jun 22, 2017
The ability to create high-volume, high-relevance, and high-velocity content is very important for B2B marketers. The Adobe and Econsultancy B2B Digital Trends 2016-2017 report dives into all the latest digital trends and opportunities that are impacting B2B. So that you can set the new standards. Read the report to learn: • The many priorities within CX and the push to improve CX • The importance of data driven marketing within CX • Why integration across all touchpoints is essential
Tags : 
b2b marketing, content marketing, customer experience, digital trends, mobile optimization
    
Adobe

Your GRC Strategy: When Is Enough Tooling Enough?

Published By: MarkLogic     Published Date: Jun 21, 2017
Global financial organizations are facing increasing demands from the business for more granularity, transparency, reporting and security. If you’re on the IT side, you know this adds a different set of ‘mores’ to the equation: More duplication, delays, and people. What’s the net-net? More cost and more risk. You can balance the scales to satisfy those demands. And it starts with thinking differently about data management. Our financial services technology experts will explore the implications of governance, risk and compliance (GRC) imperatives. You’ll learn: • Why data is at the heart of an effective and dynamic GRC strategy • Why technological capabilities used to enable standard GRC programs can reduce transparency and prevent you from gaining a holistic view of your data • A new approach to data can provide the business with complete transparency • Review a sample regulatory reporting architecture Stop burning time on tooling — and start building a dynamic GRC strategy that can
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation
    
MarkLogic

International Recruitment Company Communicates Globally with 8x8 Cloud Communications

Published By: 8x8 Inc.     Published Date: Jun 16, 2017
Tangent International is a specialist recruitment company for the technology industry. It has more than 70 employees who work with some of the most forward thinking companies in the world. A global recruiter with international needs Tangent International operates in 175 countries with candidates and clients across more than 220 locations. As a recruiter looking to source and place the best talent from all over the world, the business needed a service provider that would allow it to easily communicate with its global customer base. These customers include some of the biggest technology brands in the world who all have high expectations, so it’s vital that the technology Tangent International uses lives up to these standards.
Tags : 
global recruiting, international needs, cloud based systems, unified global workplace, 8x8 products, virtual office pro, cost saving, crm integrations
    
8x8 Inc.

Clinical Mobility: Strategy, Best Practices and Device Selection

Published By: Zebra Technologies     Published Date: Jun 15, 2017
Mobile devices help clinicians improve the quality of patient care and save lives by improving staff communication and collaboration, and by providing instant access to a wealth of mission-critical information — from real-time lab results to a change in a patient’s condition or verification of the “5 rights” of medication administration at the patient bedside. In addition, mobility also helps healthcare organizations comply with important governmental and regulatory safety standards, without tasking an already overburdened nursing staff with additional paperwork. This white paper provides guidance for planning and implementing a clinical mobility solution in today’s healthcare environment, including a five-step roadmap to help key stakeholders identify needs.
Tags : 
clinical, mobility, strategy, best practices, device, save lives
    
Zebra Technologies
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.