privacy

Results 176 - 200 of 337Sort Results By: Published Date | Title | Company Name
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
    
YouSendIt, Inc.
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt, Inc.
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt, Inc.
Published By: IBM Software     Published Date: Aug 04, 2010
The path to creating a secure application begins by rigorously testing source code for all vulnerabilities and ensuring that use of the application does not compromise or allow others to compromise data privacy and integrity.
Tags : 
ibm ouncelab, secure application, testing source code, data privacy, security, application configuration, encoding error
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information.
Tags : 
ibm ouncelab, data protection, c-level executive us, compliance, roi, performance, privacy, data security, data protection
    
IBM Software
Published By: IBM Software     Published Date: Aug 09, 2010
The following are what we believe to be the top findings in this study. We organized these findings according to five major themes that emerged: perceived threats to sensitive and confidential information, responsibility and accountability, impact on the organization, perceived value of a data protection program, and perception gaps between CEOs and other C-level executives.
Tags : 
ibm ouncelab, data protection, c-level executive uk, compliance, roi, performance, privacy, data security, data protection
    
IBM Software
Published By: Lumension     Published Date: Jan 18, 2013
HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?
Tags : 
hipaaa, hitech act, compliance, cyber liability, healthcare data, data compliance
    
Lumension
Published By: IBM     Published Date: Jan 09, 2013
IBM’s security controls provide privacy and controlled authorization to sensitive information while enabling business operations. SC4SB protects our customers' information through governance, tools, technology, techniques, and personnel.
Tags : 
smartcloud, ibm, social business security, ibm smartcloud, security, it management, data management, business technology, data center
    
IBM
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro
Published By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
    
Mimecast
Published By: AWS     Published Date: Aug 15, 2018
Earning and keeping your customer’s trust is one key to long-term success. In today’s digital world, your customers expect product and service innovations at an increasingly rapid pace. At the same time, customer privacy and data security are under close scrutiny. These trends help to explain why organizations are migrating to Amazon Web Services (AWS): to benefit from the agility, scalability, and security that it offers. AWS has always put cloud security first. This security-centric approach not only helps you more effectively protect your data on AWS, but can also help you meet security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Dec 17, 2018
Watch this webinar to learn how Tr?v Insurance Solutions, an insurance agency licensed to sell on-demand property and casualty insurance products, adopted DgSecure on Amazon Web Services (AWS) to anonymize production data to help comply with GDPR and other data privacy regulations. The solution helps Tr?v meet privacy standards while enabling its analytics teams to use data to better serve its clients.
Tags : 
    
AWS
Published By: McAfee     Published Date: Apr 04, 2017
Engaging a cloud service provider (CSP) for Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) or Software-as-a-Service (SaaS) is now common practice for enterprise IT. It is essential to make the right choice of providers and services, particularly as it relates to security practices, data privacy, and operational capabilities. Be sure to put potential Cloud Service Provider (CSP) partners under the microscope by asking them the right questions about how they will secure your most essential information.
Tags : 
saas, iaas, cloud service provider, cloud
    
McAfee
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering
    
Trend Micro SaaS
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : 
ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers, security breach, best practices for data security, data inventory, security, data management
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper provides insight into the requirements for protecting privacy in SAP non-production environments and describes some of the comprehensive data masking techniques available with the IBM® Optim™ Data Privacy Solution for SAP® Applications.
Tags : 
ibm integrated data management, data privacy, sap application, ibm optim data privacy solution, data masking, business context data elements, data integrity, data management
    
IBM
Published By: IBM     Published Date: Feb 23, 2009
This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.
Tags : 
ibm idm, data privacy, data security, database security, confidential data, security
    
IBM
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : 
trend, trend micro, webcast, security, hitrust, web, privacy, ehrs, health records
    
Trend Micro, Inc.
Published By: McAfee     Published Date: Nov 12, 2014
This brief discusses how hybrid email protection can address your privacy concerns while still gaining the benefits of cloud-based email security.
Tags : 
hybrid email security, mcafee email protection, security, it management
    
McAfee
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, knowledge management, enterprise applications, data management, data center
    
Intralinks
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing, enterprise applications, data management, business technology, data center
    
Intralinks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee