RSS feed Get our RSS feed

News by Topic

compliant

Results 1 - 25 of 167Sort Results By: Published Date | Title | Company Name
By: Apstra     Published Date: Feb 21, 2019
Customers and partners, and recently investors ask the question “How is one Intent-Based Networking (IBN) offering different than the others?” And more often than not I hear answers that sound subjective, descriptive, and subject to interpretation. What is needed are tangible, fact-based nomenclature that can help you reason about the maturity of IBN solutions. Using this nomenclature, we should be able to map IBN solutions to an IBN maturity level, starting with Level 0 (low maturity/incomplete) and going up to Level 3 which enables a fully compliant IBN solution (mature/complete).
Tags : ibn, saas
     Apstra
By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
     Canon Solutions America
By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
     Canon Solutions America
By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
     Cisco
By: Adobe     Published Date: Nov 09, 2017
To make a great first impression, take a good look at your digital enrollment process. Because it’s more than forms. It’s the start of your customer journey. A streamlined onboarding process saves customers time and hassle. It also increases conversions, improves experiences, and reduces costs. In this report, we discuss best practices for updating your digital enrollment, including: How leaders in finance do it right Increasing engagement with mobile-optimized forms and signatures Ensuring enrollment is compliant and builds trust
Tags : 
     Adobe
By: Justworks     Published Date: Sep 26, 2017
Staying compliant with payroll regulations and tax codes is a constant challenge for employers. A third of small businesses are fined for incorrect payroll procedures, turning minor errors into a major problem for the company’s bottom line. Don’t let routine payroll and human resources (HR) tasks trip up your small company. When you can’t afford the staffing it would take to keep up with over 15,000 tax codes, the easiest answer is to work with a professional employer organization (PEO). PEOs manage HR, payroll, and employee benefits, ensuring that you’re compliant and current on all regulations.
Tags : 
     Justworks
By: Justworks     Published Date: Sep 27, 2017
Staying compliant with payroll regulations and tax codes is a constant challenge for employers. A third of small businesses are fined for incorrect payroll procedures, turning minor errors into a major problem for the company’s bottom line. Don’t let routine payroll and human resources (HR) tasks trip up your small company. When you can’t afford the staffing it would take to keep up with over 15,000 tax codes, the easiest answer is to work with a professional employer organization (PEO). PEOs manage HR, payroll, and employee benefits, ensuring that you’re compliant and current on all regulations.
Tags : 
     Justworks
By: DocuSign UK     Published Date: Nov 06, 2018
Download this eBook to learn how eSignature technology and the processes associated with it not only optimise workflows but also can help make company activities more secure and compliant.
Tags : 
     DocuSign UK
By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
     Dome9
By: Dell EMC     Published Date: Oct 08, 2015
In order to protect big data today, organizations must have solutions that address four key areas: authentication, authorization, audit and lineage, and compliant data protection.
Tags : 
     Dell EMC
By: Dell APAC     Published Date: Mar 01, 2019
Dell has simplified security to be fully integrated, compliant and employee-empowering. See how easily you can secure your endpoints with Dell
Tags : 
     Dell APAC
By: Intel     Published Date: Jun 07, 2017
Technology innovation can change not only how enterprises are run, but the way people work - and business is relying on IT as a collaborative partner in the transformation process. Read on to find out more.
Tags : cloud, cloud security, transformation, digital transformation
     Intel
By: Bazaarvoice     Published Date: May 17, 2013
Learn how authentic customer feedback helps card issuers, online and retail banks, insurance companies, and credit unions drive sales, loyalty, and lifetime customer value - while remaining compliant with industry regulations.
Tags : customer acquisition, customer retention, customer innovation, compliance, financial service providers
     Bazaarvoice
By: JBoss Developer     Published Date: Feb 05, 2016
As Oracle Java Composite Application Platform Suite (CAPS) nears the end of its life cycle, healthcare organizations are switching to Red Hat JBoss Fuse to prepare for future business needs. Red Hat JBoss Fuse represents existing use cases on a more flexible, standards-compliant platform. With over 100 different connectors, Red Hat JBoss Fuse offers extensive integration coverage to optimize data flow — both to internal users and to external healthcare partners — on-premise, on mobile devices, or in the cloud.
Tags : jboss, redhat, oracle, java, java composite application platform, fuse, integration, data optimization
     JBoss Developer
By: Concerto Cloud Services     Published Date: Dec 18, 2015
Download this whitepaper to learn more about cloud compliance.
Tags : 
     Concerto Cloud Services
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology
     Microsoft
By: Juniper Networks     Published Date: Aug 10, 2017
Ellie Mae processes approximately 30 percent of residential U.S. mortgage applications through their Encompass® all-in-one mortgage management solution.Their customers include major lending institutions. By introducing extensive automation to the residential mortgage process, Ellie Mae has streamlined lenders’ ability to remain competitive, compliant, and efficient.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Juniper Networks
By: SafetyCulture     Published Date: Nov 27, 2018
Chain of Responsibility laws aren’t anything new. You’ve got the general gist of things but have you stopped to think about the consequences if you’re not fully compliant? Download our poster to hang where your whole team can see it. Because now, if you’re not breach proof you could be up for a five-year jail sentence, or a $300,000 fine. Is it worth it? Make sure everyone in your team knows the risks, and are taking responsibility for keeping your vehicle standards up to scratch.
Tags : 
     SafetyCulture
By: Intapp     Published Date: Jan 09, 2019
The legal industry is well past the days when scrawled notes in a day planner constituted time recording. The business of law has changed, requiring that time entries comply with client requirements and firm objectives. We believe the path forward is a new concept that we call “compliant time”: a way to streamline timekeeping and improve time-capture accuracy while also ensuring adherence to OCGs.This ebook explores the gaps and inefficiencies in the current stateat most law firms and shows how compliant time can help resolve these issues. Insights into how current processes impact and inhibit internal law firm stakeholder objectives reveal why firms simply must find new approaches. Declining realization rates, competitive market forces, and lawyer attraction/retention challenges are all factors that point to a need for change in time and billing technology.
Tags : law firm timekeeping, law firm better timekeeping, law firm improving timekeeping, law firm timekeeping problems, law firm timekeeping issues, law firm automated timekeeping, law firm better automated timekeeping, law firm timekeeping automation
     Intapp
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: NetApp     Published Date: Nov 13, 2017
This paper desribes key ways to accelerate business transformation by using the cloud for more workloads and controlling your data to keep critical data secure and compliant.
Tags : 
     NetApp
By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Sep 13, 2017
The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will share some thoughts around the journey organizations are on and discuss some real life examples.
Tags : 
     CA Technologies
By: Wasabi     Published Date: Oct 26, 2017
The recent Amazon S3 outage highlights the need for high-quality secondary storage and raises questions around dependence on a single-service provider. Wasabi offers a highly compelling alternative to Amazon S3 Cross Region Replication (CRR) allowing you to keep a live copy of your S3 data on Wasabi for a 1/5th the price of CRR. Fully compliant with S3, Wasabi also provides extreme data durability, integrity and security. In this tech brief we take you through Wasabi’s proposition of extreme savings with zero degradation in quality for secondary storage.
Tags : amazon s3, secondary storage, business-critical data, cloud storage, hot storage
     Wasabi
By: ServiceNow     Published Date: Aug 20, 2018
Find out how leading healthcare providers are using a proactive approach to keep their EHR and supporting infrastructure continually running and compliant with strict regulations for health data security and privacy. Learn more about keeping critical systems operational and sensitive data secure. Download this white paper to see how eliminating outages and combatting cyberattacks can help improve patient care.
Tags : 
     ServiceNow
Start   Previous   1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics