RSS feed Get our RSS feed

News by Topic

data compliance

Results 176 - 200 of 509Sort Results By: Published Date | Title | Company Name
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
This commissioned study conducted by Forrester Consulting evaluates the state of enterprises’ data privacy compliance in a shifting regulatory landscape. The survey of 218 global enterprise decision makers with responsibility over privacy or data protection analyzed how they are evolving to meet the heightened data protection and privacy expectations of legislators and consumers, along with the benefits they can expect from a holistic data privacy approach.
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Sep 04, 2019
In the last few years we have seen a rapid evolution of data. The need to embrace the growing volume, velocity and variety of data from new technologies such as Artificial Intelligence (AI) and Internet of Things (IoT) has been accelerated. The ability to explore, store, and manage your data and therefore drive new levels of analytics and decision-making can make the difference between being an industry leader and being left behind by the competition. The solution you choose must be able to: • Harness exponential data growth as well as semistructured and unstructured data • Aggregate disparate data across your organization, whether on-premises or in the cloud • Support the analytics needs of your data scientists, line of business owners and developers • Minimize difficulties in developing and deploying even the most advanced analytics workloads • Provide the flexibility and elasticity of a cloud option but be housed in your data center for optimal security and compliance
Tags : 
     Group M_IBM Q3'19
By: Group M_IBM Q418     Published Date: Sep 10, 2018
Encryption, if properly deployed and managed, is one of the most powerful tools that organizations can use to avoid costly and embarrassing data breaches. Yet organizations struggle with the complexity associated with the technology that often stems from a history of siloed investments of point solutions designed to largely address pools of regulated data associated with a compliance mandate.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Sep 25, 2018
With the deadline for GDPR compliance looming in May 2018, it’s a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
     Group M_IBM Q418
By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
     HP - Enterprise
By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This IDC White Paper discusses the impact of the critical records management, data retention, and data protection regulations across key geographies. It concludes with recommendations for developing global information governance best practices.
Tags : hp + intel, idc, data retention, data protection regulations, records management, global records compliance
     HP and Intel® Xeon® processors
By: IBM     Published Date: Dec 12, 2006
This white paper outlines the components of the Banking Data Warehouse (BDW) and how they assist financial institutions in addressing the data modeling and data consolidation issues relating to the SOX regulations.
Tags : data warehousing, database warehousing, data consolidation, sarbanes oxley compliance, sox, compliance, banking, bdw
     IBM
By: IBM     Published Date: Dec 12, 2006
This white paper will outline the components of the Banking Data Warehouse (BDW) and how they assist financial institutions to address the data modeling and data consolidation issues relating to the Basel II Capital Accord. 
Tags : data warehousing, bdw, banking data warehousing, compliance, risk management, basel ii, ibm, security
     IBM
By: IBM     Published Date: Aug 21, 2008
The world has embraced payment cards to support commercial transactions for almost every kind of business. Unfortunately, the data associated with these payment cards is the focus of many identity theft activities. This white paper outlines Payment Card Industry (PCI) requirements, as well as the benefits of compliance and the penalties for noncompliance.
Tags : ibm, ibm mi, ibm grm, pci, pci dss, pci-dss, pci compliance, data theft
     IBM
By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : ibm, enterprise master data management, corporate master data, data integration
     IBM
By: IBM     Published Date: Dec 30, 2008
Research giant Forrester estimates that on average, data repositories for large applications grow by fifty percent annually. However, up to half of all that data can be duplicate or otherwise unnecessary. With no end in sight for the increase of raw data (both structured and unstructured), organizations must be ever more strategic about where and how to store enterprise information. Meanwhile, a tightening economy is putting pressure on costs, just as compliance mandates call for greater visibility into processes and data. What to do? Register for this Web Seminar to learn the four pillars of strategic storage, and how they can be used to simultaneously reduce costs, while improving speed, accuracy and accountability. The four pillars will be discussed in detail, with real-world examples of each: deep compression, database archiving,de-duplication thin provisioning.
Tags : strategic storage, ibm, enterprise information, deep compression, database archiving, de-duplication, thin provisioning, storage
     IBM
By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata
     IBM
By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution
     IBM
By: IBM     Published Date: Feb 23, 2009
This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.
Tags : ibm idm, data privacy, data security, database security, confidential data, security
     IBM
By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : ibm, pci dss, compliance, security
     IBM
By: IBM     Published Date: Jun 15, 2009
The ability to make quick, well-informed decisions is critical to competitiveness and growth for most companies. Read the white paper to see how Data warehouse solutions can deliver business insight across virtually any business process or function. And also how they're particularly valuable for understanding sales, profiling customers and analyzing business costs.
Tags : ibm, data warehouses, warehouse, data, data solutions, sales, business costs, olap
     IBM
By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : ibm, test data privacy, compliance, data masking, payment card industry, pci, security, database
     IBM
By: IBM     Published Date: Jul 24, 2012
Detect and prevent fraud by finding subtle patterns and associations in your data. IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance more efficiently and by focusing investigations on cases that are likely to yield the biggest tax adjustments.
Tags : fraud, business, healthcare, taxes, government, ibm, spss
     IBM
By: IBM     Published Date: Aug 28, 2014
Data volumes are getting out of control, but choosing the right information lifecycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you need.
Tags : ilg, data volumes, cgoc, information economics
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics