governance

Results 351 - 375 of 514Sort Results By: Published Date | Title | Company Name
Published By: RSA     Published Date: Aug 28, 2014
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Tags : 
data breach, data access, governance, risk, prevention, security, data management
    
RSA
Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: IBM     Published Date: Jul 31, 2015
Governance solutions.
Tags : 
identity, protection, critical, solution
    
IBM
Published By: IBM     Published Date: Jan 15, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, identity governance, security, protection, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
White paper discusses how to secure the gateway to your organization with robust and integrated identity governance solutions from IBM
Tags : 
ibm, data security, risk management, data management, identity governance, security, knowledge management, enterprise applications
    
IBM
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Traditional antivirus (AV) is not the solution to preventing security breaches on the endpoint – it is the problem. AV is no longer effective at stopping today’s cyberthreats. Although AV satisfies many regulatory, governance and compliance requirements, it saddles organizations with hidden costs while providing little to no real security value.
Tags : 
palo alto, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : 
data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility, compliance
    
IBM
Published By: Druva -AWS     Published Date: Apr 28, 2018
The core capabilities of Office 365, while powerful, are not necessarily built to be a comprehensive solution for companies’ data availability and governance needs. Find out how your business can establish a strong data protection solution at a better price-point in the cloud.
Tags : 
    
Druva -AWS
Published By: SailPoint     Published Date: Feb 08, 2011
This paper introduces a next generation of provisioning solution that offer a more strategic and sustainable approach.
Tags : 
sailpoint, legacy provisioning solution, user lifecycle management, governance, compliance, identity management, corporate governance
    
SailPoint
Published By: Iron Mountain     Published Date: Aug 28, 2014
This paper examines a new paradigm for Health Information and Records Management (HIRM) and provides practical guidance to help HIM professionals unwind paper records, offload the burden of low-value production work and lead the transition from traditional records management to an optimized HIRM model.
Tags : 
iron mountain, health information management, information governance, healthcare it, electronic health records, ehr, him, him professionals, hirm, records management
    
Iron Mountain
Published By: NETIQ     Published Date: Mar 12, 2013
Sally Hudson, IDC research and analysis, sums up thoughtful Q&A session that highlights evaluating access governance solutions, developing agile processes and policies that meet security and compliance needs.
Tags : 
idc research, governance solutions, netiq
    
NETIQ
Published By: Dassault Systèmes     Published Date: May 09, 2018
More connected, informed and demanding customers have the financial services sector looking closely at their processes and products. Collaborative digital platforms can transform your value network and approach. • Improve data insights: Transform legacy systems, manual processes and data silos for consumer-centric collaboration. • Compete with agile FinTech startups: Use disruptive technologies to meet clients’ changing needs. • Empower me to make my own decisions: Give self-directed customers exceptional experiences, like rapid enrolment and self-assessment tools. • Turn regulatory compliance to competitive advantage: Use digitization to improve compliance, reduce risk and enhance governance. • Improve customer experience through digitization: Reduce regulatory issues, gain insights, increase efficiency and customer-centric innovation. I invite you to download your targeted industry analysis and uncover the expectations to take into account at every stage to be disruptive in the age o
Tags : 
    
Dassault Systèmes
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
    
CREDANT Technologies
Published By: Innotas     Published Date: May 11, 2009
Discover how IT Governance enables IT to meet these expectations, measure performance, manage resources, mitigate risk and make sure that IT aligns activities with the strategic direction of the enterprise - all for a surprisingly low cost.
Tags : 
innotas, it governance, enterprise services, it management, strategy, accountability, cost saving, business intelligence
    
Innotas
Published By: Semarchy     Published Date: Feb 12, 2018
This whitepaper covers a recently completed a ground-breaking industry wide survey of executives, architects, and business stakeholders from data-driven organizations by Enterprise Management Research in order to explore the growing role of the CDO, and to explore the various data management maturity levels of enterprise companies. This whitepaper explains how industry visionaries use data as an asset, and discusses the growing importance of data governance leadership. Additionally, it creates a data management maturity index to show how various companies match-up in their data management vision and capabilities. Finally, the whitepaper covers the top data-focused applications used and their average implementation timelines.
Tags : 
    
Semarchy
Published By: IBM     Published Date: Jun 17, 2014
Key findings from an industry roundtable on enterprise risk transformation in Canadian banking.
Tags : 
ibm, risk enabled enterprise, enterprise risk management, erm, big data, data aggregation, corporate governance, business analytics, cultural alignment, analytical applications
    
IBM
Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure, best practices, regulatory compliance, cmdb, tideway, tideway systems, it management
    
Tideway Systems
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC has received the highest rating of “Strong Positive” in Gartner MarketScope for IT Governance, Risk & Compliance Management (IT GRC) 2013 for the fifth consecutive time.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: Rubrik EMEA     Published Date: Jan 04, 2019
Rubrik Cloud Data Management is a single, unified software platform to manage your physical, virtual, and cloud data. With Rubrik, enterprises can drastically simplify their data protection processes, automate workflows, and migrate data to the cloud. The results are powerful: faster recoveries, easier management, no forklift upgrades, and hard dollars saved for other projects. Organizations pursuing cloudfirst policies can use Rubrik to archive to the cloud, create cloud DR capabilities, or perform cloud-native backup. And with Rubrik’s Polaris SaaS platform, it has never been easier to unify data across data centers and clouds, simplifying operations and governance. DATA
Tags : 
    
Rubrik EMEA
Published By: Sage People     Published Date: Jul 27, 2018
You might think your non-profit organisation (NPO) doesn’t have much in common with a traditional business. After all, traditional businesses only really care about driving profit and growth—which are certainly important to you but further down your list when compared to other issues like ensuring governance requirements are met, plus the need to manage donors or members, and fulfilling compliance requirements.
Tags : 
    
Sage People
Published By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : 
social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, social media management software, social media marketing tools, social media monitoring tools, social media management company
    
Spredfast
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
The nature of corporate accounting and financial controls has forever been changed by Sarbanes-Oxley legislation. This white paper discusses the ripple effect of the Act on the IT outsourcing community and the new responsibilities and ethics that rest on companies, both public and private, that entrust all or part of their IT environment to an external third party.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan, infor, axapta, microsoft dynamics ax, fusion, outsourcing, governance, outsource, sarbox, sarbanes oxley, sarbanes-oxley, sox, sox compliance
    
OneNeck IT Services
Published By: SAS     Published Date: Aug 28, 2018
With the amount of information in the digital universe doubling every two years, big data governance issues will continue to inflate. This backdrop calls for organizations to ramp up efforts to establish a broad data governance program that formulates, monitors and enforces policies related to big data. Find out how a comprehensive platform from SAS supports multiple facets of big data governance, management and analytics in this white paper by Sunil Soares of Information Asset.
Tags : 
    
SAS
Published By: Infosys Technologies Limited     Published Date: Sep 22, 2010
This white paper describes creating a governance framework for managing identity.
Tags : 
governance, compliance, identity analytics, identity management
    
Infosys Technologies Limited
Published By: Intralinks     Published Date: May 29, 2013
Ensuring the security of confidential, sensitive information is an essential element of enterprise Security and Governance, Risk Management and Compliance programs. Regulations, such as the HIPAA, FDA, and SOX, place significant requirements on organizations for securely sharing sensitive data such as confidential personally identifiable information (PII) and personal health information (PHI).
Tags : 
security, sensitive information, sharing, mobile file sharing, solutions, confidential, software development, storage, data management
    
Intralinks
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept