data access

Results 351 - 375 of 740Sort Results By: Published Date | Title | Company Name
Published By: Workday APAC     Published Date: Mar 05, 2020
Today, businesses have access to more information than ever before. But turning data into insights often means managing a patchwork of systems, data models, security settings, and tools. That’s where one source for data and Workday come in. Watch this video to learn how we give business leaders tailored, self-service access to insights they can act on—while keeping security intact.
Tags : 
    
Workday APAC
Published By: SailPoint Technologies     Published Date: Feb 12, 2019
Cyberthreats have shifted from attacking network/IT resources to targeting users. Find out how identity governance protects your users and puts you in control of data access.
Tags : 
identity governance, iam, identity management, user-centric security
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Apr 10, 2019
With health data breaches increasing 70% over the past seven years,* it has become obvious that identity needs to be at the heart of your security program. Find out how you can protect access, maintain compliance and reduce risk with SailPoint.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 16, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Oct 25, 2019
With digital transformation, securing your identities and data has never been more important. Find out how oil and gas companies are using identity governance to make sure employees, contractors, suppliers, business partners and bots are only accessing the right information, at the right time.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Nov 15, 2019
Protecting your organization requires seeing your security gaps and closing them. Download this datasheet to learn why SailPoint is the best way to govern and secure user access to all your applications, including SAP.
Tags : 
    
SailPoint Technologies
Published By: Oracle     Published Date: Jun 10, 2019
Yes, you can build better trust in your data —but only if the organization can collect, structure, analyze and protect data in the right ways with the right tools. Modern supply chains integrate a host of related parties (and human error) into knowledge systems, which include business metrics, supplier sustainability performance data, and even intellectual property (IP). This is why systems and data must be built around secure access and verifiable trust. To find out more, download this report today!
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jun 10, 2019
Yes, you can build better trust in your data —but only if the organization can collect, structure, analyze and protect data in the right ways with the right tools. Modern supply chains integrate a host of related parties (and human error) into knowledge systems, which include business metrics, supplier sustainability performance data, and even intellectual property (IP). This is why systems and data must be built around secure access and verifiable trust. To find out more, download this report today!
Tags : 
    
Oracle
Published By: Medius     Published Date: Oct 01, 2019
AP automation is often described as low hanging fruit in the garden of digital transformation. And for a good reason – the barrier to entry is impressively low in terms of both cost and effort needed to get up and running, particularly in comparison to the implementation projects for other business applications. Despite that fact, the value provided from AP automation is comparably high. For such an easy implementation, the benefits reach throughout an organization, beyond the walls of the AP department, and are near-immediate from day one of using the solution. Standard benefits include: Immediate value from day one with an expected ROI within the first year Up to 95% truly touchless invoice processing with access to real-time cloud data for benchmarking and reporting Easy access to financial data, such as cash flow & accrual reporting, with full visibility and control of the AP process This guide will help you kick-start your AP automation project by defining the 6 steps to build
Tags : 
ap automation, invoice processing, invoice automation, accounts payable automation, accounting software, accounting automation, microsoft dynamics automation
    
Medius
Published By: Medius     Published Date: Apr 02, 2020
Organizations around the world are grappling with the effects of the COVID-19 pandemic and an uncertain economy, and are facing unprecedented challenges managing their business and keeping the company running while still protecting their employees. Now is the right time to optimize your AP automation processes as the barrier to entry is impressively low in terms of both cost and effort needed to get up and running. The value provided from an AP automation solution is extremely high in the current environment, and might be crucial to ensure business continuation and workforce safety. Standard benefits include: Remote, digital and flexible working for AP and finance teams. Full visibility into essential real-time financial data, including cash flow and management. Easy access to financial data, such as cash flow & accrual reporting, with full visibility and control of the AP process. Immediate value from day one with a cloud-based AP automation solution and deployment as part of your
Tags : 
    
Medius
Published By: Lenovo - StudioNorth     Published Date: Jan 13, 2020
Computing devices are rising to the challenge. They are more flexible and offer increasingly expanding functionality. That’s good news — CIOs can be assured that the newest devices can handle the demands of technologies such as VDI (virtual desktop infrastructure), AR/VR, and high-resolution imaging. However, new devices must also meet increasing regulatory compliance and requirements for secure, hack-resistant patient data access.
Tags : 
    
Lenovo - StudioNorth
Published By: Naviga Global - 1H 2020 - Q1-20     Published Date: Feb 24, 2020
"In a world where your employees and customers are constantly bombarded with a multitude of messages from multiple sources and through numerous channels, you need a way to quickly sort through the noise and determine the most relevant, mission-critical information. Furthermore, your stakeholders require this information in a manner that is timely and in an actionable format, so that decisions can be made based upon data — not just gut feelings. Check out this on-demand webinar to learn how our Content-as-a-Service (CaaS) solution turns information into business value by enabling you to: ?Uncover and streamline your access to the most impactful content from over 17,500+ sources ?Tag and organize new and existing content in a way that makes sense for your business ?Ensure real-time delivery of content to your internal stakeholders and channel partners"
Tags : 
    
Naviga Global - 1H 2020 - Q1-20
Published By: Entrust Datacard APAC     Published Date: Mar 19, 2020
Customer-driven strategies based on Instant Issuance technologies are allowing financial institutes to provide a better customer experience, increase their brand loyalty and enjoy a greater market share. Their customers are enjoying instant gratification with Instant Issuance, regardless if it is for new accounts, replacement of lost or expired cards, or reissuance after a security incident or breach. Instant Issuance is not limited to branch locations – cards can be issued in retail stores, remote locations, airports, casinos, and even cruise ships. In fact, some forward-thinking financial institutions are using self-service kiosks, which allow consumers to assume even greater control over the process. For the past 25 years, Entrust Datacard has been working with financial institutions to produce high-quality cards that appeals to even the most demanding consumers. Access to the E-Book to understand how you can grow into a better, stronger, more sought-after brand.
Tags : 
    
Entrust Datacard APAC
Published By: Oracle     Published Date: Oct 20, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
With the growing size and importance of information stored in today’s databases, accessing and using the right information at the right time has become increasingly critical. Real-time access and analysis of operational data is key to making faster and better business decisions, providing enterprises with unique competitive advantages. Running analytics on operational data has been difficult because operational data is stored in row format, which is best for online transaction processing (OLTP) databases, while storing data in column format is much better for analytics processing. Therefore, companies normally have both an operational database with data in row format and a separate data warehouse with data in column format, which leads to reliance on “stale data” for business decisions. With Oracle’s Database In-Memory and Oracle servers based on the SPARC S7 and SPARC M7 processors companies can now store data in memory in both row and data formats, and run analytics on their operatio
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
ESG Lab evaluated the Zero Data Loss Recovery Appliance from Oracle with a focus on its ability to deliver reliable data protection by recovering Oracle databases to any point in time with sub-second RPO in a highly scalable scale-out solution that is easy to use and manage. Year after year, ESG respondents consistently cite improving data backup and recovery among the top IT priorities in our annual spending intentions survey (including 2016’s iteration). Why? Because when unforeseen infrastructure failures or data corruptions occur, the ability to restore not only business-critical information but also application and end-user access to that information become paramount. Lost or prolonged inaccessibility to business-critical data and applications most often means lost revenue and productivity to the business, and possibly the inability to meet regulatory requirements.
Tags : 
    
Oracle
Published By: VMware AirWatch     Published Date: Nov 12, 2015
IT requires a solution that solves the challenge of securing proprietary applications and data in the cloud datacenter and is available only to users and devices that are delegated safe for access. VMware NSX solves this challenge through user-level micro-segmentation. The VMware NSX approach offers several differentiated advantages over traditional security approaches.
Tags : 
vmware, cloud datacenter security, mobility, smart networking, vmware nsx, micro segmentation, networking, security
    
VMware AirWatch
Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
Intel Security
Published By: IBM APAC     Published Date: Mar 19, 2018
MongoDB, one of the most popular NoSQL Open databases, helps you take advantage of exploding unstructured data with faster access to data and analytics while reducing your database cost. With the right infrastructure, you can benefit more. By running MongoDB on IBM Power systems, you can achieve: • ?Bring new apps to market faster and reduce the risk for mission-critical deployments • ?2.6x better performance for MongoDB at a much lesser cost than x86 Find out more about IBM Power Systems and MongoDB for today’s applications.
Tags : 
    
IBM APAC
Published By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : 
tco, websense, web security, osterman, hybrid, security solutions
    
Websense
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.