HIT Consultant Insightful coverage of healthcare innovation
 

data privacy

Results 126 - 150 of 189Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 15, 2015
How to create proactive big data security and privacy strategies
Tags : 
data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.
Tags : 
ibm, big data, data security, privacy strategies, ibm infosphere
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : 
ibm, data, security, virtualization
    
IBM
Published By: IBM     Published Date: Aug 29, 2016
Download the TechRadar data security road map from Forrester and find out what it takes to protect your data—and your business.
Tags : 
ibm, b2b, commerce, b2bi, business to business integration, integration, forrester, data security, privacy
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : 
ibm, security, data, privacy, forrester, forrester research
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption
    
VeriSign Incorp.
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Published By: Modis     Published Date: Mar 09, 2015
In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond. Download to learn more!
Tags : 
modis, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches
    
Modis
Published By: IBM     Published Date: Jan 14, 2015
Bloor Research investigated several key critical success factors for big data analytics. Their findings show that governance, data cleansing, and privacy and security have never been more important. Read this paper to see their conclusions.
Tags : 
big data, data management, data exploration, gain visibility, security extension, business intelligence, explore data, data analytics
    
IBM
Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management, best practices, prediction practices
    
SAS
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the SpectorSoft Implementing Monitoring white paper and you will learn how to assist company executives with determining whether or not to implement employee activity monitoring.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download The SpectorSoft Insider Threat Survey Report and read about 10 alarming Insier Threat trends.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then we’ll look at why investigating proactively can help.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 22, 2014
Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: CrowdTwist     Published Date: Jul 25, 2018
Over the last decade customer-brand relationships have become more and more digitized. Companies have enjoyed access to new technologies, new capabilities, and greater access to customer data. In turn, consumers have become better informed and able to connect with brands with greater flexibility and convenience. However, concerns around mismanagement of customer data, the proliferation of fake news, high profile retailer database breaches, and the Cambridge Analytica scandal has contributed to an erosion of trust between consumers and brands and demands for data privacy. What can brands do to overcome consumer skepticism? What keeps a customer coming back in 2018? And what can brands do to demonstrate relevancy and provide value?
Tags : 
customer, branding, relationships, consumer, database
    
CrowdTwist
Published By: Oracle     Published Date: Mar 04, 2014
In This Paper • Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud • Understand the business and regulatory requirements around the data to be moved to the cloud • Know your cloud provider’s security and privacy commitments, and what responsibilities you retain
Tags : 
oracle, oracle cloud services, security, cloud provider, privacy
    
Oracle
Published By: CrowdCompass     Published Date: Jul 20, 2017
You know you need a mobile event app, but choosing the right one can sometimes be a tricky, painstaking process. Ranging from freemium/low-cost solutions to full capability, multi-event apps, determining what you need for your conferences, tradeshows, incentive events, meetings, and more is no easy task. Let us help. Download our free eBook: “Simple Questions for Success – The Definitive Guide to Selecting a Mobile App” and find the awesome event app of your, and your attendees, dreams.
Tags : 
mobile app, event app, easy planning, social media integration, social media, networking capabilities, mobile event app, return on investment, mobile personalization, mobile networking, mobile interaction, mobile security, data privacy
    
CrowdCompass
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation
    
IBM
Published By: IBM     Published Date: Aug 30, 2010
This white paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Tags : 
ibm, data privacy, sensitive data, identity theft, security
    
IBM
Published By: netVigilance     Published Date: Aug 21, 2009
Today's Corporate Executives are faced with an array of Data Security legislation which mandates that they be personally accountable for the protection of customer account information. Crippling penalties present a modern day 'sword of Damocles' hanging above the desks of CTOs, CIOs, CFOs and CEOs.
Tags : 
data security, data protection, privacy, compliance, hipaa, customer data, database security, regulatory compliance, net vigilance, netvigilance
    
netVigilance
Published By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : 
hipaa compliance, ip faxing, ip networks, records management, information management, data protection, privacy, security policies, fax server, server hardware, castelle
    
Castelle
Published By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : 
quocirca, content security, aep networks, clearswift, symantec, trend micro, websense, smtp
    
Quocirca
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega
    
Aomega
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.