RSS feed Get our RSS feed

News by Topic

data compliance

Results 251 - 275 of 495Sort Results By: Published Date | Title | Company Name
By: Oracle Corp.     Published Date: Oct 15, 2012
Hear from Tammy Bednar, Senior Principal Product Manager at Oracle as she discusses best practices for database auditing, alerting and reporting across Oracle and non-Oracle databases using Oracle Audit Vault.
Tags : database auditing, audits, compliance, database, oracle, database security
     Oracle Corp.
By: Oracle Corp.     Published Date: Oct 15, 2012
During this webcast Kamal Tbeileh, Sr. Principal Product Manager at Oracle, will discuss database access control best practices for all database users, including highly privileged users using Oracle Database Vault.
Tags : database, database access control, database security, database consolidation, compliance, oracle
     Oracle Corp.
By: Webroot UK     Published Date: Nov 11, 2009
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration
     Webroot UK
By: Webroot UK     Published Date: Nov 11, 2009
The software-as-a-service model can help you stay ahead of Web and email threats without breaking the bank on infrastructure and management. Find out more in this whitepaper.
Tags : webroot, saas, software-as-a-service, web security, email security, threats, storage management, tco
     Webroot UK
By: NetIQ     Published Date: Dec 23, 2010
To effectively deal with the broad and complex requirements of Payment Card Industry (PCI) data security, you need to break the elements apart to provide enhanced clarity. This document deals with file integrity monitoring (FIM) for PCI, while providing practical technical guidance to help ensure PCI Compliance before your auditor shows up to develop the ROC.
Tags : netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester
     NetIQ
By: NetIQ     Published Date: Dec 23, 2010
The Payment Card Industry Data Security Standard (PCI DSS) establishes standard requirements protecting cardholder information. It applies to all entities that store, process, or transmit cardholder data, such as retail merchants, payment processors, and banks.
Tags : netiq, roi, pci dss, compliance
     NetIQ
By: DataFlux     Published Date: Jan 07, 2011
This white paper addresses data profiling techniques that can help the analyst understand the empirical truth associated with enterprise data.
Tags : dataflux, data profiling, enterprise data, analyst, data rule validation, metadata compliance
     DataFlux
By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : security compliance, users access management, it management compliance
     NETIQ
By: EVault     Published Date: Mar 21, 2014
Hier volgen vier populaire mythes rondom cloud back-up en recovery : 1. Het is onmogelijk om de privacy van data in de cloud te waarborgen. 2. Het is onmogelijk om controle te houden over wie toegang heeft tot data in de cloud. 3. De cloud gaat niet samen met compliance. 4. Met back-up in de cloud is geen snelle recovery mogelijk. Ontdek de waarheid en lees waarom de cloud nog steeds een geschikte optie is voor back-up, en tevens de beste. Laat hier uw gegevens achter en ontvang zo spoedig mogelijk uw white paper.
Tags : evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security
     EVault
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features. View on-demand now
Tags : mimecast, virtual event, email archiving, email solutions, cloud archiving
     Mimecast
By: Citrix ShareFile     Published Date: Apr 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : encryption, compliance, data encryption, data protection, regulation compliance, efficiency
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Securely store and share your firm's and your clients' tax information data. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
     Canon Solutions America
By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
     Canon Solutions America
By: Microsoft     Published Date: Jul 20, 2018
Microsoft provides a solution to easily run small segments of code in the cloud with Azure Functions. Azure Functions provides solutions for processing data, integrating systems, and building simple APIs and microservices. The book starts with intermediate-level recipes on serverless computing along with some use cases on the benefits and key features of Azure Functions. Then, we'll deep dive into the core aspects of Azure Functions, such as the services it provides, how you can develop and write Azure Functions, and how to monitor and troubleshoot them. Moving on, you'll get practical recipes on integrating DevOps with Azure Functions, and providing continuous deployment with Visual Studio Team Services. The book also provides hands-on steps and tutorials based on real-world serverless use cases to guide you through configuring and setting up your serverless environments with ease. Finally, you'll see how to manage Azure Functions, providing enterprise-level security and compliance to
Tags : 
     Microsoft
By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
     Mimecast
By: TRUSTe     Published Date: Jan 19, 2012
Forrester believes that marketers should take charge of self-regulation implementation today to protext their brand reputation as well as data collection in the long run. Read to find out more.
Tags : truste, forrester, marketing, advertising, digital advertising, privacy, compliance, interactive marketing
     TRUSTe
By: GFI Software     Published Date: Mar 21, 2011
This white paper examines the necessary requirements to adhere to PCI DSS, the implications of non-compliance as well as how effective event log management and network vulnerability management play a key role in achieving compliance.
Tags : gfi, pci dss, credit card, event log management, network vulnerability management, compliance
     GFI Software
By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : ibm, enterprise master data management, corporate master data, data integration
     IBM
By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities
     IBM
By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : ibm, pci dss, compliance, security
     IBM
By: IBM     Published Date: Jun 15, 2009
The ability to make quick, well-informed decisions is critical to competitiveness and growth for most companies. Read the white paper to see how Data warehouse solutions can deliver business insight across virtually any business process or function. And also how they're particularly valuable for understanding sales, profiling customers and analyzing business costs.
Tags : ibm, data warehouses, warehouse, data, data solutions, sales, business costs, olap
     IBM
By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : ibm, test data privacy, compliance, data masking, payment card industry, pci, security, database
     IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics