privacy

Results 251 - 275 of 356Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data, security
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : 
ibm, data, security, virtualization, data management
    
IBM
Published By: IBM     Published Date: Aug 29, 2016
Download the TechRadar data security road map from Forrester and find out what it takes to protect your data—and your business.
Tags : 
ibm, b2b, commerce, b2bi, business to business integration, integration, forrester, data security
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : 
ibm, security, data, privacy, forrester, forrester research, data management, business technology
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
ibm, security, identity governance and intelligence, identity governance, gdpr, governance, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
With the deadline for GDPR compliance looming in May 2018, it’s a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
    
IBM
Published By: IBM     Published Date: Sep 10, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
With the deadline for GDPR compliance looming in May 2018, it’s a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
    
Group M_IBM Q418
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Apr 13, 2018
Read about IBM solutions that can help you comply with the upcoming GDPR governing the privacy and security of user and customer data.
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security
    
VeriSign Incorp.
Published By: McAfee, Inc.     Published Date: May 21, 2009
In this white paper written by Yankee Group and sponsored by McAfee, learn why daily vulnerability scanning is the kind of tough , no-nonsense measure that your consumers may be looking for before they can open up their wallets.
Tags : 
yankee, mcafee, trust marks, security, vulnerability management, e-commerce, reputation, privacy
    
McAfee, Inc.
Published By: Splunk Inc.     Published Date: Jun 02, 2009
Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.
Tags : 
compliance, splunk, it agenda, it security, regulations, proof-of-compliance, pci, hipaa
    
Splunk Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : 
verisign, health, ehr, security, breaches, risks, web-based, information
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: TRUSTe     Published Date: May 06, 2010
This whitepaper will explore how business leaders like yourself can align trust, credibility and privacy processes in your organization-and your company's broader ecosystem-into a Business Integrity Strategy.
Tags : 
truste, roi, privacy, trust, credibility, business integrity strategy, identity
    
TRUSTe
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark
    
Cisco
Published By: Modis     Published Date: Mar 09, 2015
In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond. Download to learn more!
Tags : 
modis, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches
    
Modis
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on-premise solutions. Even though a high percentage of enterprises are adopting cloud storage and compute within their businesses, the adoption of cloud-based content and collaboration products is by no means universal. Concerns relating to governance, risk, and compliance with regard to cloud services are understandable, but it is not unusual to find them overstated.
Tags : 
    
Microsoft Office 365
Published By: Lenovo     Published Date: Sep 12, 2018
Three generations – Baby Boomers, Generation X, and Millennials – currently make up about 97% of the U.S. workforce, according to the U.S. Bureau of Labor Statistics. This white paper places a spotlight on Lenovo devices that allow such a diverse workforce to thrive. By completing this form, you have agreed to receive marketing communications from Lenovo and are providing express consent to receive these messages. You may unsubscribe at any time using the link included in each email message. To learn more about our privacy policy, visit the Lenovo Privacy page.
Tags : 
    
Lenovo
Published By: IBM     Published Date: Jan 14, 2015
Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.
Tags : 
big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
IBM
Published By: BlueHornet     Published Date: Jun 06, 2008
Your online brand reputation can affect many areas of email marketing, including acquisition strategy, list hygiene, delivery, and conversion rates. Join experts from BlueHornet's Deliverability & Privacy Services team and Pivotal Veracity to learn ways to assess and manage your online brand reputation more easily.
Tags : 
email marketing, email messaging, blue hornet, bluehornet, branding, reputation
    
BlueHornet
Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management, best practices, prediction practices, security
    
SAS
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.