RSS feed Get our RSS feed

News by Topic

data requirements

Results 226 - 250 of 321Sort Results By: Published Date | Title | Company Name
By: Paymetric     Published Date: Dec 13, 2007
This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.
Tags : erp, pci, pci compliance, erp, pci, ompliance, sap, sap
     Paymetric
By: GlobalSCAPE     Published Date: Jan 08, 2008
The Payment Card Industry Data Security Standard is a detailed series of 130+ requirements that anyone who stores or transfers credit card data has to comply with.  However due to the protection it offers, the PCI DSS is fast becoming a security standard for all sensitive data that needs to be protected.  The goal of the standard is to ensure security of data in transit and at rest while ensuring compliance is maintained. 
Tags : pci, pci dss, pci compliance, compliance, credit card, credit cards, payment card, data protection
     GlobalSCAPE
By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper examines common misconceptions about data encryption and describes how new approaches dispel earlier myths. WinMagic solutions demonstrate that a centrally managed approach to data security using current-generation processor capabilities and modern disk technologies can effectively meet enterprise requirements.
Tags : data, encryption, solutions, security, enterprise, requirements, capabilities, winmagic
     WinMagic Inc.
By: Pillar Data Systems     Published Date: Apr 20, 2010
In this brief 23-minute on-demand Webinar, opinion leaders from Pillar Data Systems and industry experts from featured analyst firm, Gartner, Inc., break down the challenges that today's organizations face and help them to select a flexible storage platform that will adapt to changing business and application requirements while minimizing risks and reducing management complexity.
Tags : pillar data systems, modern storage infrastructure, it infrastructure, productivity, tco, green it, data
     Pillar Data Systems
By: DoubleTake     Published Date: Jul 14, 2010
SMBs in regulated industries are also subject to the same data availability and data protection requirements as large corporations for regulations such as HIPAA, FDA Part 11, Sarbanes-Oxley and SEC Rule 17, but without the budgets necessary to meet these requirements. This whitepaper provides six tips for an SMB approach to protecting data, such as confidential employee information, so download now to learn how keep your SMB protected from this critical loss of data.
Tags : double-take, smbs, server, midsize, backup, vulnerability
     DoubleTake
By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : arcserve, unified data protection, software download, bandwidth, deduplication
     Arcserve
By: Lenovo and Intel®     Published Date: Jan 19, 2017
Dive into this comprehensive eBook to get the details you need for starting virtualization. Written by Brian Suhr, author of the blogs Data Center Zombie and VirtualizeTips, and edited by Sachin Chheda of Nutanix™, you get all the detailed analysis and key points to consider, including: ? Architectural Principles ? Building Blocks ? Infrastructure Alternatives ? Storage Requirements ? Compute Sizing
Tags : 
     Lenovo and Intel®
By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : tripwire, integrity, data, clinical, electronic, software, cfr11, trustworthiness
     Tripwire
By: IBM     Published Date: May 28, 2014
Read the whitepaper to find out how one client improved business value of their data by implementing InfoSphere Optim processes and technologies.
Tags : ibm, data lifecycle management, infosphere optim, integrating big data, governing big data, integration, best practices, big data
     IBM
By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration
     IBM
By: IBM     Published Date: Aug 28, 2014
Data volumes are getting out of control, but choosing the right information lifecycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you need.
Tags : ilg, data volumes, cgoc, information economics
     IBM
By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, cloud, social business, big data, data security, data protection, privacy, security
     IBM
By: IBM     Published Date: Nov 09, 2015
IBM believes the Data Warehouse market continues to expand and adapt to address new requirements for user self-service, increased agility, requirements for new data types, lower cost solutions, adoption of open source, driving better business insight, and faster time to value.
Tags : ibm, data, magic quadrant, data management, analytics
     IBM
By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : ibm, data security, risk management, big data, security
     IBM
By: IBM     Published Date: Sep 30, 2016
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : ibm, security. big fix, infirmary health system, case study, esm technology, security
     IBM
By: IBM     Published Date: Dec 15, 2016
The IBM DataPower Operations Dashboard provides the most robust solution in the marketplace for monitoring DataPower gateways and performing trouble-shooting & analysis. Administrators can view operational data with full-text search to immediately diagnose errors and highlight impact analysis, DevOps can view and troubleshoot their own DataPower services, and business owners can generate automated reports to meet SLA and compliance requirements without assistance from centralized IT.
Tags : ibm, middleware, ibm datapower gateways, ibm datapower operations dashboard
     IBM
By: IBM     Published Date: Jan 09, 2017
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : ibm, security. big fix, infirmary health system, case study, esm technology, security
     IBM
By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
     IBM
By: Group M_IBM Q418     Published Date: Sep 25, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
     Group M_IBM Q418
By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
     Cisco
By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
     Utimaco
By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber
     Mentor Graphics
By: HP Virtualization     Published Date: Mar 22, 2010
This white paper describes how HP LeftHand SANs can help you deploy VMware Infrastructure 3 (VI3) software more effectively through volume snapshots, SmartClone volumes, volume migration, and high-availability features. With HP LeftHand SAN and VI3, organizations can reclaim valuable data center space and reduce their power and cooling requirements.
Tags : san, storage area networks, vmware, software, migration
     HP Virtualization
By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : endpoint proliferation, ids, ips, externalization, cisco, security
     Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics