HIT Consultant Insightful coverage of healthcare innovation
 

data privacy

Results 1 - 25 of 198Sort Results By: Published Date | Title | Company Name
Published By: Gigya     Published Date: Jun 08, 2015
To get a look at the current state of data privacy and personalization, Gigya recently commissioned a survey with OnePoll to collect the perspectives of modern consumers. The results reveal that, when it comes to sharing their data with brands, consumers across the globe are demanding 3 key values: transparency, relevance and convenience.
Tags : 
data privacy and personalization, modern consumers, social login, consumer concerns, data privacy
    
Gigya
Published By: Oracle     Published Date: Mar 04, 2014
In This Paper • Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud • Understand the business and regulatory requirements around the data to be moved to the cloud • Know your cloud provider’s security and privacy commitments, and what responsibilities you retain
Tags : 
oracle, oracle cloud services, security, cloud provider, privacy
    
Oracle
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: RSA     Published Date: Sep 19, 2017
The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.
Tags : 
gdpr, data protection, rsa, rsa security, personal data, privacy
    
RSA
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Dassault Systèmes
Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Venafi     Published Date: Mar 26, 2015
The rampant rise in cyberattacks and the growing concerns and regulations over data privacy are compelling the increased use of SSL/TLS. But managing even more SSL/TLS to protect data is challenging. See how you can safely expand and rely on SSL/TLS to achieve your data security and privacy goals.
Tags : 
data protection, cyberattacks, data privacy, ssl/tls, security, privacy
    
Venafi
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
cyber security, energy efficiency, power and cooling systems, mean time to recovery, mttr, data privacy, cloud-based platforms, digital remote monitoring, data center
    
Schneider Electric
Published By: Eloqua     Published Date: Jan 13, 2012
Email deliverability is about maximizing the potential number of emails reaching the inbox. Privacy is about safeguarding the personal information contained in your mailing database. Download this guide to learn about privacy and deliverability.
Tags : 
email deliverability, email privacy, privacy and deliverability, email marketing, marketing automation, email marketing platform, digital body language, database marketing, email privacy policy
    
Eloqua
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Over 90% of organizations believe that the GDPR will impact the way they collect, use and process personal data. It’s one of the biggest changes to hit the digital privacy landscape in 20 years. And, in May 2018, the EU General Data Protection Regulation (GDPR) will introduce maximum fines of €20 million for non-compliance.
Tags : 
digital privacy, data protection, gdpr, organization optimization, technical challenges, data regulation, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Juniper Networks     Published Date: Jun 22, 2017
As the pressures of digital disruption force companies to either transform or die, companies in Asia’s BFSI sector are rushing to integrate cutting-edge technologies and roll-out innovative new services to their customers. Fortunately, thanks to rapidly advancing technologies, developments in the regulatory landscape and the initiative of leading BFSI organisations, we are seeing incredible examples of innovation within the sector on a monthly, if not weekly, basis. To celebrate this trend, we will showcase in this article a selection of the latest and greatest innovations offered by Asia’s leading BSFI organisations, which we believe represent the future of BFSI services not just in the region, but worldwide.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
As the pressures of digital disruption force companies to either transform or die, companies in Asia’s BFSI sector are rushing to integrate cutting-edge technologies and roll-out innovative new services to their customers. Fortunately, thanks to rapidly advancing technologies, developments in the regulatory landscape and the initiative of leading BFSI organisations, we are seeing incredible examples of innovation within the sector on a monthly, if not weekly, basis.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
Astaro
Published By: GFI     Published Date: Jul 09, 2007
This white paper highlights why organizations need to implement event log auditing as an integral part of their security policy to meet industry standards such as the Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi
    
GFI
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega
    
Aomega
Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi
    
GFI
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.