RSS feed Get our RSS feed

News by Topic

data requirements

Results 1 - 25 of 322Sort Results By: Published Date | Title | Company Name
By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : collaboration, social media risk and reward, retention regulations, data, business requirements
     Actiance, Inc.
By: Adobe     Published Date: Nov 09, 2017
Marketing leaders are asking their analytics teams to provide better insights into customers, prospects and journeys, and a more accurate assessment of the impact of marketing tactics. Use this research to find a digital marketing analytics tool to support your needs. This Magic Quadrant is intended for chief marketing of?cers (CMOs), marketing analytics and data science practitioners, and other digital marketing leaders involved in the selection of systems to support marketing analytics requirements.
Tags : 
     Adobe
By: Alcatel-Lucent     Published Date: Dec 02, 2009
Faster, more powerful and dense computing hardware generates significant heat and imposes considerable data center cooling requirements.
Tags : data center design and management, distributed computing, internetworking hardware, power and cooling
     Alcatel-Lucent
By: ALE     Published Date: Jan 10, 2019
Departments of roads and highways around the world have begun to implement technology solutions to improve the safety of their highways, lessen congestion and manage traffic more efficiently. Intelligent Transport Systems (ITS), as these systems are known, require reliable, secure and scalable networks to link cameras, sensors, signage, signaling and vehicles to remote data centers and operation centers. These networks will be deployed in harsh environments and will pose their own unique challenges to operate, maintain and manage. In this application note, we will present the unique requirements of ITS networks and discuss how AlcatelLucent Enterprise products and technologies not only meet today’s ITS requirements, but are designed to grow and scale to meet tomorrow’s as well.
Tags : 
     ALE
By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
     Alert Logic
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : alert logic, rackspace, log management, automated log management, pci, hipaa, glba, log data
     Alert Logic and Rackspace
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
     Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To comply with today’s government and industry mandates, such as PCI, Sarbanes-Oxley, HIPAA and GLBA, log data must be collected, regularly reviewed and archived. In addition, regular analysis and forensics can also be performed on the same log data to enhance overall security and availability. This paper discusses the challenges associated with effective log management and enables you to better define best practices and requirements for log management projects, as well as log management and review solutions.
Tags : alert logic, sungard, log management, automated log management, pci, hipaa, glba, log data
     Alert Logic and Sungard Availability Services
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
     Alert Logic and Sungard Availability Services
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security
     AlienVault
By: AlienVault     Published Date: Oct 20, 2017
Maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance can be both difficult and expensive. For most small to medium sized organizations, it doesn’t have to be as long as you have the right plan and tools in place. In this paper you’ll learn five steps to implement and maintain PCI DSS compliance at your organization by: • Determining your true business requirements • Inventorying locations and assets • Segmenting environments • Operationalizing controls • Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise. This checklist will help you on your quest to achieve and maintain PCI DSS compliance.
Tags : 
     AlienVault
By: Altiscale     Published Date: Oct 19, 2015
In this age of Big Data, enterprises are creating and acquiring more data than ever before. To handle the volume, variety, and velocity requirements associated with Big Data, Apache Hadoop and its thriving ecosystem of engines and tools have created a platform for the next generation of data management, operating at a scale that traditional data warehouses cannot match.
Tags : big data, analytics, nexgen, hadoop, apache
     Altiscale
By: APC by Schneider Electric     Published Date: Jan 21, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : cbs interactive, data, security, cloud
     APC by Schneider Electric
By: Arcserve     Published Date: Jun 11, 2014
Virtualization has without doubt enabled IT organizations to obtain maximum efficiency from their physical hardware, but virtualization has also increased the complexity these organizations have to manage, and that includes data protection. This paper discusses some of the hidden complexities virtualization introduces to backup and recovery requirements, and the challenges created when backup involves a combination of physical servers and virtual machines. It also discusses ways that backup and recovery processes can be simplified by avoiding point solutions.
Tags : arcserve, next generation architecture, data protection, data protection operations, metrics, security
     Arcserve
By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : arcserve, unified data protection, software download, bandwidth, deduplication
     Arcserve
By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management
     Attachmate
By: Attunity     Published Date: Nov 15, 2018
With the opportunity to leverage new analytic systems for Big Data and Cloud, companies are looking for ways to deliver live SAP data to platforms such as Hadoop, Kafka, and the Cloud in real-time. However, making live production SAP data seamlessly available wherever needed across diverse platforms and hybrid environments often proves a challenge. Download this paper to learn how Attunity Replicate’s simple, real-time data replication and ingest solution can empower your team to meet fast-changing business requirements in an agile fashion. Our universal SAP data availability solution for analytics supports decisions to improve operations, optimize customer service, and enable companies to compete more effectively.
Tags : 
     Attunity
By: Attunity     Published Date: Feb 12, 2019
How can enterprises overcome the issues that come with traditional data warehousing? Despite the business value that data warehouses can deliver, too often they fall short of expectations. They take too long to deliver, cost too much to build and maintain, and cannot keep pace with changing business requirements. If this all rings a bell, check out Attunity’s knowledge brief on data warehouse automation with Attunity Compose. The solution automates the design, build, and deployment of data warehouses, data marts and data hubs, enabling more agile and responsive operation. The automation reduces time-consuming manual coding, and error-prone repetitive tasks. Read the knowledge brief to learn more about your options.
Tags : dwa, data warehouse automation, etl development, extract transform load tools, etl tools, data warehouse, data marts, data hubs data warehouse lifecycle
     Attunity
By: Avaya     Published Date: Jan 20, 2015
The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.
Tags : software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions
     Avaya
By: Avaya     Published Date: Jan 28, 2015
The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.
Tags : software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions
     Avaya
By: Aviatrix     Published Date: Jun 11, 2018
Join Aviatrix for a discussion of next-generation transit hubs that are purpose-built to treat the network as code, rather than as a virtualized instance of a data center router. Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that deliver on those requirements. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
     Aviatrix
By: AWS     Published Date: Nov 15, 2018
"Riteway Sales and Marketing, who helps many Southeastern supermarkets execute marketing strategies, needed an intuitive solution to visualize data in multiple ways, including geographic coding that could map gathered data to store locations. TIBCO® Spotfire® for Amazon Web Services cloud met their requirements and exceeded them. After deploying this solution, Riteway’s Director of Insights and Marketing, Elisa Westlund, claimed that their time-to-insight rose to 93% faster than it was before using it. When analyzing a product category, they found that what used to take a week for their team to accomplish could now be completed in only hours. Download this case study to learn more about TIBCO Spotfire’s benefits, including: • Riteway’s claim of time-to-insight that rose 93% faster than before using TIBCO Spotfire • A complete return on investment in just one year • 100% adoption among their business users, due to TIBCO Spotfire’s ease of use"
Tags : 
     AWS
By: AWS - ROI DNA     Published Date: Nov 19, 2018
"Organizations are increasingly moving their mission-critical applications and data to Amazon Web Services (AWS) and taking advantage of the massive compute power of Amazon Elastic Compute Cloud (Amazon EC2). The CrowdStrike Falcon® platform for AWS provides extensive and detailed visibility over Amazon EC2 instances, helping to improve an organization’s overall security posture. Learn how CrowdStrike® Falcon Discover™ enables IT security professionals to quickly identify and stop threats. Download this solution brief to learn how you can help satisfy your security requirements by: • Monitoring and searching metadata to improve security posture • Reviewing the rate of the Amazon EC2 instances launched over time • Gaining additional context surrounding alerts"
Tags : 
     AWS - ROI DNA
By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : remote, remote access, remote network, network management, network security, hipaa, hippa, sox
     Axeda Corporation
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics