RSS feed Get our RSS feed

News by Topic

data compliance

Results 376 - 400 of 501Sort Results By: Published Date | Title | Company Name
By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store
     Intel Security
By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution, security
     K2
By: CA Technologies EMEA     Published Date: Aug 03, 2017
Over 90% of organizations believe that the GDPR will impact the way they collect, use and process personal data. It’s one of the biggest changes to hit the digital privacy landscape in 20 years. And, in May 2018, the EU General Data Protection Regulation (GDPR) will introduce maximum fines of €20 million for non-compliance.
Tags : digital privacy, data protection, gdpr, organization optimization, technical challenges, data regulation, anonymize data, privacy projects
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Aug 03, 2017
The key tenets of protecting data privacy are: knowing where your data resides, understanding who has access to the data and what are they doing with it, and knowing how the data is being used internally that may result in non-compliance. Additionally, most compliance projects are major, company-wide initiatives and must be managed properly to meet deadlines and keep costs in check.
Tags : classify data, gdpr, risk reduction, breach protection, anonymize data, privacy projects, data management
     CA Technologies EMEA
By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Mar 31, 2008
Discover how to achieve and maintain FISMA compliance to ensure security of systems and data.
Tags : fisma, government, federal regulations, federal regulation, fisma compliant, citizen, constituent, constituency
     Tripwire
By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness
     Tripwire
By: Tripwire     Published Date: Jun 30, 2009
Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.
Tags : tripwire, hipaa, security, provision, network, health, company, system
     Tripwire
By: Tripwire     Published Date: Apr 21, 2010
This paper includes key research findings, from a recent IDG survey, and strategies to overcome this legacy challenge.
Tags : tripwire, legacy log management, data security, compliance automation solutions, it security, cso
     Tripwire
By: Symantec     Published Date: Jun 13, 2018
The General Data Protection Regulation (GDPR) takes effect May25, 2018. If you process European Union (EU) personal data, GDPR likely applies to you—even if you’re not in the EU. That’s because the regulation is truly global in scope and applies to any organization that processes EU personal data, irrespective of where the companies are based or where the data is processed. At its heart, the GDPR legislation is about ensuring privacy is respected as a fundamental right and that personal data is kept private and secure. Elizabeth Denham, of the EU Information Commissioner Office (ICO), says “This law is not about fines. It’s about putting the consumer and citizen first” and “Issuing fines has always been and will continue to be, a last resort.” However, it’s important to note the costs of noncompliance can be severe. These can include a fine of up to 4 percent of global turnover (revenues) or €20m, whichever is higher; a temporary or permanent suspension of the right to access or proce
Tags : 
     Symantec
By: IBM     Published Date: Aug 28, 2014
Data volumes are getting out of control, but choosing the right information lifecycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you need.
Tags : ilg, data volumes, cgoc, information economics
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
     IBM
By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction
     IBM
By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
     IBM
By: IBM     Published Date: Jul 15, 2015
How to create proactive big data security and privacy strategies
Tags : data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
     IBM
By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
     IBM
By: IBM     Published Date: Oct 06, 2015
Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.
Tags : ibm, data security, big data, endpoint devices, safeguarding, security
     IBM
By: IBM     Published Date: Jan 07, 2016
Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data, security, compliance, information
     IBM
By: IBM     Published Date: Jan 15, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations.
Tags : ibm, identity governance, compliance, risk control, security
     IBM
By: IBM     Published Date: Apr 04, 2016
Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security
Tags : ibm, identity governance, risk control, risk management, data security, security
     IBM
By: IBM     Published Date: Apr 06, 2016
By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM Security Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.
Tags : ibm, data security, data security, ibm security gaurdium, security
     IBM
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data security, risk management, big data, security
     IBM
By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : ibm, data, security, virtualization
     IBM
By: IBM     Published Date: Dec 15, 2016
The IBM DataPower Operations Dashboard provides the most robust solution in the marketplace for monitoring DataPower gateways and performing trouble-shooting & analysis. Administrators can view operational data with full-text search to immediately diagnose errors and highlight impact analysis, DevOps can view and troubleshoot their own DataPower services, and business owners can generate automated reports to meet SLA and compliance requirements without assistance from centralized IT.
Tags : ibm, middleware, ibm datapower gateways, ibm datapower operations dashboard
     IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics