privacy

Results 51 - 75 of 338Sort Results By: Published Date | Title | Company Name
Published By: ForgeRock     Published Date: Mar 22, 2018
What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.
Tags : 
forgerock, consumer privacy, data security, iot, internet of things, internet security, consumer behavior, tracking data, business technology
    
ForgeRock
Published By: ServiceNow     Published Date: Aug 20, 2018
Find out how leading healthcare providers are using a proactive approach to keep their EHR and supporting infrastructure continually running and compliant with strict regulations for health data security and privacy. Learn more about keeping critical systems operational and sensitive data secure. Download this white paper to see how eliminating outages and combatting cyberattacks can help improve patient care.
Tags : 
    
ServiceNow
Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk
Published By: Workday APAC     Published Date: Dec 18, 2018
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
    
Workday APAC
Published By: Mimecast     Published Date: Apr 25, 2017
Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance.
Tags : 
gdpr, security, regulation, forrester
    
Mimecast
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Fear of data misuse has led to both general and industry-specific data-privacy regulations worldwide that many organizations now must meet, and it’s important to embrace their requirements. The role of data-holding organizations has increasingly shifted to being stewards of information, in particular in the United States and the European Union (EU). And failure to comply with regulations can mean not only reputational damage, but substantial fines and even jail time. Just meeting compliance mandates, though, may not help you actively spot and stop a data breach.
Tags : 
data misuse, security, privacy regulations, data breach, compliance mandates
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so starting May 25, 2018.
Tags : 
gdpr, data protection, right to access, data breach, personal data
    
IBM
Published By: IBM     Published Date: Sep 06, 2018
General Data Protection Regulation (GDPR) represents a paradigm shift in the way companies across the globe must approach protecting personal data. As of May 2018, EU data subjects now have greater autonomy than ever before over how their personal information is collected, stored and shared – and the repercussions for companies that fail to comply will be significant. At the heart of the matter lies Data Security and Protection. Protect the personal data, and you are well on your way to tackling many of the challenges the GDPR presents. But this is no easy task – before you protect your data, you must understand it, and even once you’ve achieved these goals, continually re-evaluate your data privacy and protection posture to adapt to changes in this dynamic environment.
Tags : 
    
IBM
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security, security, it management, data management, business technology
    
Kaspersky Lab
Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee
Published By: MobileIron     Published Date: Jul 31, 2015
This whitepaper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. This white paper also reviews the privacy enhancements that Apple, Google, and Microsoft have made to their operating systems. When used with an enterprise mobility management (EMM) platform, these enhancements enable a more powerful set of privacy protections than was available even two years ago.
Tags : 
    
MobileIron
Published By: Mimecast     Published Date: Oct 11, 2018
Information management is getting harder. Organizations face increasing data volumes, more stringent legal and regulatory record-keeping requirements, stricter privacy rules, increasing threat of breaches and decreasing employee productivity. Companies are also finding that their old-fashioned, legacy archive strategies are increasingly ineffective. This is driving many organizations to rethink their approach, developing more modern Information Governance strategies.
Tags : 
    
Mimecast
Published By: Intralinks     Published Date: Feb 23, 2016
To explore the impact of evolving data privacy regulations and data sovereignty, Ovum was commissioned in Q3 2015 by Intralinks to conduct an international survey of 366 IT decision-makers.
Tags : 
intralinks, data privacy, ovum, data security, security, data management
    
Intralinks
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care: How built-in data encryption keeps your PHI, DICOM studies safe Why more security pros are concerned with user behavior than cloud tools What your organization should know about the cloud and compliance
Tags : 
healthcare, data security, cloud software, privacy, patient care
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
The General Data Protection Regulation(GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Tags : 
data security, data protection, risk reduction, security regulation, data breach
    
Citrix ShareFile
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
The GDPR is set to have wide-ranging implications for the type of data which can be used in non-production environments. Organizations will need to understand exactly what data they have and who’s using it, and must be able to restrict its use to tasks for which consent has been given.
Tags : 
organization scope, data controllers, technology, gdpr, application regulation, corporate rules, contractual clauses, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Oltre il 90% delle aziende ritiene che il GDPR influenzerà le proprie modalità di raccolta, utilizzo ed elaborazione di dati personali. È uno dei cambiamenti più rivoluzionari apportati al panorama della privacy digitale negli ultimi vent'anni e, nel mese di maggio 2018, il GDPR dell'Unione europea introdurrà sanzioni fino a 20 milioni di euro in caso di mancata compliance.
Tags : 
gdpr, general data protection regulation, ca technologies, privacy, compliance, protezione dei dati
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
The EU's General Data Protection Regulation (GDPR) is the most stringent and burdensome privacy mandate in the world. The penalty for major violations can be up to 20 million euros or 4% of your company's annual global revenue.
Tags : 
protection, regulation, gdpr, data protection, global, revenue, risk
    
Commvault ABM Oct
Published By: Amazon Web Services EMEA     Published Date: Sep 24, 2018
Under GDPR, we all have new obligations to improve the security and privacy of personal data at our organisations. With the new Amazon Web Services eBook, GDPR: The Basics, you’ll gain a fundamental understanding of this new EU regulation. In this eBook, you will learn about: • How to view GDPR as an opportunity, and how you can build on it • Article 32 – a core part of the security principle • Data subject rights • Key players and responsibilities • And much more
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Dassault Systèmes
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee