RSS feed Get our RSS feed

News by Topic

fines

Results 126 - 150 of 221Sort Results By: Published Date | Title | Company Name
By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
     Centrify Corporation
By: Ring Central     Published Date: Aug 28, 2013
Business of all sizes have a fundamental reliance on their communications infrastructure. We use it to interact with our colleagues, our customers, partners and suppliers and for them to communicate with us. Our ability to effectively communicate defines our capacity to conduct our business successfully. This guide is designed to help you with the considerations you should be taking when looking to implement a new communications solution. It will provide you with the tools you will need to start.
Tags : phone solution, advice and considerations, ring central, communication, business communication, corporate communication, business decisions, communications infrastructure
     Ring Central
By: IBM     Published Date: Sep 30, 2013
The Smarter Workforce Accelerator uses a structured model that helps you understand your current capabilities and those that you need to develop to achieve your Smarter Workforce objectives. The assessment focuses on your current environment and capabilities such as scouting talent, recruiting talent, leadership development, and your work culture and methods. Each capability is assessed using an objective framework that defines the characteristics of an organization at each level. This approach helps you understand: • Your current and desired capability levels • Your organization’s relative maturity compared with the competition and leading practice • Business opportunities and priorities resulting from the capability gaps
Tags : ibm, ibm smarter workforce accelerator, workforce management, social business, technology, smarter workforce, recruiting, staffing
     IBM
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
     Trend Micro, Inc.
By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : database, security, mcafee, data breach
     McAfee
By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : data security, compliance, technology, network security, regulatory compliance, security
     Intralinks
By: Oracle     Published Date: Feb 03, 2014
Take a deep dive into how and why Oracle Tap was created and learn how the native iPad application redefines the level of productivity that can be achieved while on-the-go.
Tags : oracle, oracle tap, webcast, ipad, application, productivity, enterprise applications
     Oracle
By: Oracle     Published Date: Feb 03, 2014
Take a deep dive into how and why Oracle Tap was created and learn how the native iPad application redefines the level of productivity that can be achieved while on-the-go.
Tags : oracle, oracle tap, webcast, ipad, application, productivity, enterprise applications
     Oracle
By: MobileForce Software     Published Date: Nov 19, 2014
ESG is seeing a new focus on platforms designed to support both development and integration. The need to address integration is akin to the elephant in the room—everyone is aware of the situation but nobody has a good way to resolve it. The siloed heterogeneous environment that defines IT today needs a pragmatic approach to bringing together application integration and mobilization. However, the resolution to the integration problem cannot just be addressed from a data or messaging perspective. Context and process is needed to bind these systems together in a meaningful way.
Tags : integration, enterprise application, mobilization, development, data, messaging perspective, platform
     MobileForce Software
By: SAP     Published Date: Jan 27, 2009
This paper explains SAP’s vision for a cross-enterprise governance, risk and compliance (GRC) solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.
Tags : sap, governance, risk, compliance, cross-enterprise governance, sap solutions, grc solutions, enterprise-wide risk monitoring
     SAP
By: SAP     Published Date: Jun 23, 2009
In this paper, Frank Dravis, Six Factors Consulting, discusses how even with the finest marketing organizations, the success of marketing ultimately comes down to the data.
Tags : single platform, data integration, data quality, quality management, soa, architecture, soa, sap businessobjects data services
     SAP
By: SAP     Published Date: May 13, 2010
Aberdeen Group defines "Pervasive BI" as the existence of an information environment where access to and usage of business intelligence capabilities is available to all stakeholders in an organization when, how, and where they work. Read this research to learn more about "Pervasive BI."
Tags : sap, business intelligence, performance, aberdeen pm, performance management, pace
     SAP
By: IBM     Published Date: May 31, 2017
What defines cognitive manufacturing maturity? Our study found three stages of cognitive manufacturing maturity. We call those organizations in the earliest stage Observers, followed by Starters and Actives, respectively. These groups differ on two key characteristics: the presence of an overall strategy for cognitive manufacturing, and degree of strategic execution of multiple projects that enable higher project success and significantly fewer failed projects. Strategy is the crucial enabler of higher maturity. How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, cognitive computing, organizational maturity, electronics, ibv
     IBM
By: Qualys     Published Date: Jan 11, 2017
In this age of supply chain interconnectedness, a large organization may have hundreds of third parties with access to its physical premises, IT networks and data. Your organization may have a secure IT infrastructure, but third parties can make it vulnerable to breaches, which often result in corporate data theft, brand damage and hefty government fines.
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: BlackBerry     Published Date: Sep 30, 2009
In September 2008 Research In Motion (RIM) commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises can realize by deploying mobility solutions using BlackBerry smartphones and BlackBerry Enterprise Server software. Forrester defines a BlackBerry enterprise solution as consisting of both BlackBerry smartphones and the BlackBerry Enterprise Server which together deliver a range of benefits to the organization.
Tags : blackberry, mobile applications, cio, rim, roi, pim, voip, smartphones
     BlackBerry
By: SPSS Inc.     Published Date: Mar 31, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
     SPSS Inc.
By: SAS     Published Date: Mar 01, 2012
This paper defines predictive analytics, then details ways this type of analytics can be applied to marketing, risk, operations and more. It also includes information relevant to a wide variety of industries - from manufacturing to hospitals.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
     SAS
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Aug 16, 2012
This report defines "tier-1" storage in the modern IT world and in the data centers and services that support it.
Tags : 
     Sponsored by HP and Intel® Xeon® processors
By: Intel Security     Published Date: Apr 06, 2016
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : rackspace, cloud, application, software development, security
     Rackspace
By: CA Technologies EMEA     Published Date: Aug 03, 2017
Over 90% of organizations believe that the GDPR will impact the way they collect, use and process personal data. It’s one of the biggest changes to hit the digital privacy landscape in 20 years. And, in May 2018, the EU General Data Protection Regulation (GDPR) will introduce maximum fines of €20 million for non-compliance.
Tags : digital privacy, data protection, gdpr, organization optimization, technical challenges, data regulation, anonymize data, privacy projects
     CA Technologies EMEA
By: Eaton     Published Date: Jan 26, 2016
Arc flashes—the fiery explosions that can result from short circuits in high-power electrical devices—kill hundreds of workers in the U.S. every year and permanently injure thousands more. They can also wreak financial havoc in the form of fines, lawsuits, and damage to expensive equipment. This white paper aims to fill that knowledge gap by providing introductory-level information about what arc flashes are and what you can do to prevent them.
Tags : eaton, arc flashes, data center solutions, data centers
     Eaton
By: IBM     Published Date: Apr 13, 2015
IDC Retail Insights defines omni-channel merchandise optimization as the set of technologies, data assets, skills, processes, and management intent required to develop and maintain sets of targeted and localized offers that best satisfy important business objectives. These goals include customer satisfaction, customer lifetime value, and category, channel, and corporate performance. By "offers," IDC Retail Insights means the broad set of attributes that characterize assortments, products, services, prices, utility, and convenience that match customers' buying criteria and shopping behaviors. Targeted and localized offers present a compelling "choice set" that satisfies and delights consumers. Download this white paper to read the questions posed by IBM to Greg Girard, program director of Omni-Channel Analytics Strategies at IDC Retail Insights, on behalf of IBM's customers.
Tags : omni-channel merchandise, ibm, targeted offers, localized offers, customer satisfaction, corporate performance, emerging marketing, internet marketing
     IBM
By: HireRight     Published Date: Jul 31, 2013
As state E-Verify legislation becomes more ubiquitous, coupled with federal legislation and increasingly stringent enforcement policies, it has never been more important for all organizations, regardless of size or industry.
Tags : hireright, i-9 compliance, ice fines, e-verify legislation, human resources
     HireRight
By: Symantec     Published Date: Jun 13, 2018
The General Data Protection Regulation (GDPR) takes effect May25, 2018. If you process European Union (EU) personal data, GDPR likely applies to you—even if you’re not in the EU. That’s because the regulation is truly global in scope and applies to any organization that processes EU personal data, irrespective of where the companies are based or where the data is processed. At its heart, the GDPR legislation is about ensuring privacy is respected as a fundamental right and that personal data is kept private and secure. Elizabeth Denham, of the EU Information Commissioner Office (ICO), says “This law is not about fines. It’s about putting the consumer and citizen first” and “Issuing fines has always been and will continue to be, a last resort.” However, it’s important to note the costs of noncompliance can be severe. These can include a fine of up to 4 percent of global turnover (revenues) or €20m, whichever is higher; a temporary or permanent suspension of the right to access or proce
Tags : 
     Symantec
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics