data privacy

Results 1 - 25 of 189Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so you’re positioned to achieve real cost savings.
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
Astaro
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
As the use of cloud solutions in government increases, both business and IT leaders are recognizing that the safety and success of their business depend on finding ways to take full advantage of cloud innovation while ensuring consistent service levels, data management and privacy, and user experiences. Hybrid IT management includes aligning the organization around service levels, cost control, security, and IT-enabled innovation.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Despite momentous benefits, cloud computing has its own set of challenges that must be addressed. The primary concern that many enterprises and end users have is related to security, especially data protection and privacy and loss of control. This article discusses the several challenges associated with security for cloud-based video conferencing and how organizations can remove these barriers by adopting solutions that implement security as a key tenet.
Tags : 
cloud, video conference, protection, security, management
    
LifeSize, a division of Logitech
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Dome9     Published Date: Apr 25, 2018
Cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. But there is one aspect of cloud that consistently worries IT and security professionals – how to achieve high levels of security in the cloud. As cloud adoption increases, the fears of unauthorized access, stolen identities, data and privacy loss, and confidentiality and compliance issues are rising right along with it. This report has been produced by the 350,000 member Information Security Community on LinkedIn in partnership with Crowd Research Partners to explore how organizations are responding to the security threats in the cloud and what tools and best practices IT cybersecurity leaders are considering in their move to the cloud. 2
Tags : 
    
Dome9
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Dell     Published Date: May 04, 2015
This infographic includes results from a 2015 survey conducted exclusively for CBS Interactive and illustrates: • The top-ranked security threats of 2014 • The percentage of companies adopting mobile security technology • The most popular data protection methods • What to look for in a comprehensive data protection solution
Tags : 
security breach, data security, privacy, phishing
    
Dell
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Venafi     Published Date: Mar 26, 2015
The rampant rise in cyberattacks and the growing concerns and regulations over data privacy are compelling the increased use of SSL/TLS. But managing even more SSL/TLS to protect data is challenging. See how you can safely expand and rely on SSL/TLS to achieve your data security and privacy goals.
Tags : 
data protection, cyberattacks, data privacy, ssl/tls, security, privacy
    
Venafi
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
HPE Data Privacy Services bring your organization the necessary infrastructure support to help you protect sensitive data across the entire IT lifecycle.
Tags : 
    
Hewlett Packard Enterprise
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Oct 25, 2017
My name is Jonathan McCaffrey and I work on the infrastructure team here at Riot. This is the first post in a series where we’ll go deep on how we deploy and operate backend features around the globe. Before we dive into the technical details, it’s important to understand how Rioters think about feature development. Player value is paramount at Riot, and development teams often work directly with the player community to inform features and improvements. In order to provide the best possible player experience, we need to move fast and maintain the ability to rapidly change plans based upon feedback. The infrastructure team’s mission is to pave the way for our developers to do just that - the more we empower Riot teams, the faster features can be shipped to players to enjoy.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Published By: Infomatica     Published Date: Jul 15, 2015
UPMC is a cutting edge leader in harnessing the power of technology and accelerating innovation. This case study explores how UPMC was able to integrate clinical, financial, administrative, genomic and other information and use this data to: • Improve research outcomes in search of cures and other diseases • Determine the true cost of providing care with longitudinal patient records • Examine clinical practice variations to benchmark and improve future procedures • Strengthen information security, privacy and compliance capabilities
Tags : 
    
Infomatica
Published By: IBM APAC     Published Date: Sep 25, 2017
As technology has progressed companies have always taken advantage of it to evolve how they engage with their customers. But today, something different, more fundamental is happening. How shoppers and buyers want to interact and transact with companies is changing dramatically, driven by the fusion of physical and digital channels.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
IBM APAC
Published By: Workday UK     Published Date: Mar 07, 2018
The clock is ticking: A year from today, the EU’s General Data Protection Regulation (GDPR) will take effect. With that in mind, now is a good time to talk about how Workday offers tools that help customers meet their GDPR obligations. But first, here’s a brief refresher: The GDPR is an EU regulation meant to harmonize the patchwork of data protection laws in Europe. The GDPR repeals and replaces not just the current EU data protection directive, but also the Byzantine system of privacy legislation that each EU member state enacted under that directive.
Tags : 
    
Workday UK
Published By: Voltage Security     Published Date: Sep 28, 2012
Meeting Data Residency and Compliance Challenges in Global Enterprises
Tags : 
data residency, information privacy, patriot ii act, voltage security, business technology
    
Voltage Security
Published By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
data security, regulation, legal system, data protection
    
MobileIron
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
As the pressures of digital disruption force companies to either transform or die, companies in Asia’s BFSI sector are rushing to integrate cutting-edge technologies and roll-out innovative new services to their customers. Fortunately, thanks to rapidly advancing technologies, developments in the regulatory landscape and the initiative of leading BFSI organisations, we are seeing incredible examples of innovation within the sector on a monthly, if not weekly, basis.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.