data protection

Results 1 - 25 of 1100Sort Results By: Published Date | Title | Company Name
Published By: Reltio     Published Date: May 21, 2018
Effective May 25, 2018, General Data Protection Regulation (GDPR) will represent the most rigorous data protection regulation ever. Complying is not optional, and the penalties are very high. As companies scurry for total compliance, it makes sense to pause, assess, and use this opportunity not only for compliance but for managing customer data efficiently and gainfully. Reltio proposes ten simple steps to ensure your data management strategy is ready for GDPR, not just for assured compliance but going beyond and enabling better customer experiences and building business competence.
Tags : 
    
Reltio
Published By: Red Gate     Published Date: May 09, 2018
This whitepaper looks at what the changing data privacy and protection landscape means for organizations.
Tags : 
    
Red Gate
Published By: AnalytixDS     Published Date: May 04, 2018
The General Data Protection Regulation (GDPR) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside the EU. The General Data Protection Regulation (GDPR) will go into effect from May 25 2018, making organizations accountable for personal data protection including how and where data is stored and how it is processed within the organization. Get ready for the most comprehensive governance and automation platform in the industry.
Tags : 
    
AnalytixDS
Published By: Innovative Systems     Published Date: Feb 20, 2018
Organizations around the world are scrambling to understand and comply with the new European Union (EU) General Data Protection Regulation (GDPR) which impacts not only EU companies, but anyone who handles the data of EU citizens. Download this white paper to learn how to quickly and cost-effectively have the correct information to meet GDPR requirements without needing an army of data management professionals.
Tags : 
    
Innovative Systems
Published By: Infogix     Published Date: Apr 21, 2017
Data Governance and GDPR go Together Like Peanut Butter and Jelly May 2018 might sound far away, but any organization that does business in the EU must be prepared on day one to comply with the new General Data Protection Regulation (GDPR). This regulation carries stiff penalties for non-compliance – first time violators should expect to pay up to the greater of 4% of global annual revenue or 20 million EUR in fines – so it behooves organizations to cross their i's and dot their t's in regards to their GDPR plan. One integral component that is vital is instituting data governance to understand the organization’s data from a business perspective. Learn more about "What is considered Personally Identifiable Information?”, “What are the GDPR compliance obligations?”, and “Why data governance is vital?” in an easy to read white paper titled: General Data Protection Regulation (GDPR) and the Vital Role of Data Governance.
Tags : 
    
Infogix
Published By: IO-Tahoe     Published Date: May 14, 2018
The “silver lining” in GDPR compliance efforts is a creation of transparency and trust with customers, many of whom have layers of concern and trepidation over how all companies they do business with are handling their data. GDPR compliance efforts offer a chance to clear this air, between organizations and their customers, in a way that’s beneficial to both sides. In Io-Tahoe’s eBook, we explore the obligatory components of GDPR compliance, and the mindset most appropriate to achieving it. We also investigate opportunistic facets of establishing comprehensive protection policy around personal or sensitive data. We look at the prospect of GDPR compliance through the exploration of several “mandates”. Download the e-book to find out more on the eight mandates and the dividends beyond.
Tags : 
    
IO-Tahoe
Published By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
    
Datastax
Published By: IBM     Published Date: Jul 09, 2018
If your organisation carries out business in the European Union, then you may be aware that your life is about to become a lot more complicated starting in May 2018. That’s when the new EU General Data Protection Regulation (GDPR) will take effect. IBM is positioned to help you develop strategies to address the challenges of the GDPR. Our Pathways for GDPR readiness are phased programme engagement points and cognitive capabilities which can accelerate your journey. This new, stronger regulation will aim to harmonise data protection across all 28 EU Member States. In some cases, it will merely strengthen or enhance specific rights which are already in place under many local data privacy laws, whilst other rights and obligations will be introduced for the first time.
Tags : 
    
IBM
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, business intelligence, data integration
    
Ounce Labs, an IBM Company
Published By: Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
Cylance
Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix, business intelligence
    
Vision Solutions
Published By: Vision Solutions     Published Date: Sep 11, 2008
Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.
Tags : 
vision, high availability, ibm, idata protection, journaling, database development, data integration
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jul 06, 2008
This white paper provides a road map to the most effective strategies and technologies to protect data in AIX environments and provide fast recovery should data be lost or corrupted due to accident or malicious action. The paper also outlines the benefits of continuous data protection (CDP) technologies for AIX.
Tags : 
vision, high availability, ibm, aix, cdp
    
Vision Solutions
Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union, database security
    
Vision Solutions
Published By: Cibecs     Published Date: May 30, 2012
The Cibecs and IDG Connect annual Data Loss Survey uncovers the latest trends and statistics around business data protection
Tags : 
    
Cibecs
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
    
IBM
Published By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : 
astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco
    
Astaro
Published By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : 
absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
    
APC by Schneider Electric
Published By: Verisign     Published Date: May 31, 2017
Verisign has a unique view into distributed denial of service (DDos) attack trends, including attack statistics, behavioral trends and future outlook. The below data contains observations and insights about attack frequency and size derived from mitigations enacted on behalf of customers of Verisign DDoS Protection Services from January through March 2017.
Tags : 
    
Verisign
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : 
hyperflex, systems, data platform, storage efficiency, business, cisco
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
For the typical enterprise, the volume of data that needs to be managed and protected is growing at roughly 40% per year. Add to that the performance requirements of new applications and the demands for instant response time, always-on availability, and anytime-anywhere access. With such demands, data center managers face storage challenges that cannot be addressed using traditional, spinning-disk technology.
Tags : 
    
Hewlett Packard Enterprise
Published By: Veritas     Published Date: Sep 30, 2016
This paper summarizes the trends that have made modernizing backup and recovery an urgent priority, the key requirements for solution offerings, and the unique capabilities of Veritas NetBackup™ Appliances in delivering a simple, complete, and cost-effective solution.
Tags : 
    
Veritas
Published By: Veritas     Published Date: Sep 30, 2016
Read this paper to keep up with the latest trends and learn eight tips to maximize the value of your data protection investment, so you can free up resources to innovate and create business value.
Tags : 
    
Veritas
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.