data compliance

Results 326 - 350 of 517Sort Results By: Published Date | Title | Company Name
By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: NAVEX Global     Published Date: Nov 19, 2013
Is your organization benefiting from the full ROI of automated policy and procedure management? Policies and procedures are the building blocks of every organization. This eBook offers articles geared toward managing the policy lifecycle from drafting and validating to approving and implementing, as well as increasing security and important steps toward protecting against data breaches.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: NetApp     Published Date: Dec 12, 2013
Read how the NetApp Distributed Content Repository Solution is an efficient and risk-reducing active archive solution. Based on customer data, Forrester created a composite organization and concluded that the NetApp Distributed Content Repository delivered a three year ROI of 47% with a payback period of 1.3 months. The key benefits are reduced risk of losing unregulated archived data, denser storage, storage solution efficiency, and compliance for regulated data. The study also provides readers with a framework to do their own financial impact evaluation.
Tags : forrester, tei, economic impact, netapp, distributed content, repository solution, key benefits, reduce risk, denser storage, regulated data, data management, data center
     NetApp
By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : security, compliance, enterprise, mobile solution, networking
     xMatters
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security, networking, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : networking, security, it management
     CDW-Trend Micro
By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, you’ll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, it’s possible for you to build, deploy, and manage modern apps at scale with a globally-distributed database—without the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safe—with industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
     Microsoft Azure
By: Mimecast     Published Date: Dec 20, 2018
The right solution for archiving electronic content provides the foundation supporting the conventional, defensive applications for data retention such as compliance and e-discovery; but also the proactive applications that enable competitive and other advantages. Sponsored by Mimecast, this paper from Osterman Research details how archiving trends and use cases are changing and key recommendations on building a next-generation solution.
Tags : 
     Mimecast
By: AWS     Published Date: Aug 15, 2018
Earning and keeping your customer’s trust is one key to long-term success. In today’s digital world, your customers expect product and service innovations at an increasingly rapid pace. At the same time, customer privacy and data security are under close scrutiny. These trends help to explain why organizations are migrating to Amazon Web Services (AWS): to benefit from the agility, scalability, and security that it offers. AWS has always put cloud security first. This security-centric approach not only helps you more effectively protect your data on AWS, but can also help you meet security and compliance standards.
Tags : 
     AWS
By: AWS     Published Date: Oct 31, 2018
Watch this webinar to learn how a financial services organization uses a simple, comprehensive data governance solution from Dataguise to discover, protect, and monitor sensitive personal data in real time across all its Amazon Web Services (AWS) data repositories, and to prepare for GDPR compliance.
Tags : financial, services, organization, gdpr
     AWS
By: McAfee     Published Date: Mar 31, 2017
The widespread adoption of cloud services has resulted in sensitive data assets being stored in cloud services. This solution brief takes a deep dive of McAfee’s unified approach to data security that protects both on premise and cloud-resident data from loss and to meet and maintain compliance
Tags : unified data protection, data protection, cloud adoption, cloud vsibility, cloud data protection, cloud access security broker, shadow it
     McAfee
By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility, shadow it, compliance
     McAfee
By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach, pii encryption, pii encryption best practices, public sector printing, secure public sector printing, security breach in public sector
     Canon Solutions America
By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
     Qualys
By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
     Trend Micro SaaS
By: Tripwire     Published Date: Oct 14, 2010
Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.
Tags : tripwire, data protection, data breach risk, threats, compliance
     Tripwire
By: Tripwire     Published Date: Oct 14, 2010
Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands.
Tags : tripwire, compliance, data protection, cio, automation, intelligence, information security
     Tripwire
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management
     IBM
By: IBM     Published Date: Feb 23, 2009
This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.
Tags : ibm idm, data privacy, data security, database security, confidential data, security
     IBM
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
     Mimecast
By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : mimecast, saas, software as a service, email archive, medium-size business, esg, storage
     Mimecast
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : trend micro, trend, e-discovery
     Trend Micro, Inc.
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com