• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

privacy

Results 326 - 350 of 351Sort Results By: Published Date | Title | Company Name
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
    
Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
    
Data Guard Systems, Inc
By: Okta     Published Date: Apr 29, 2015
Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers’ privacy and shielding them from fraud and other malicious activities. This report will help S&R pros understand the growing mobile authentication market and its transformative impact on customers’ mobile moments.
Tags : 
mobile, apps, mobile apps, s&r, fraud, okta, security, it management
    
Okta
By: CS Risk Management & Compliance Ltd     Published Date: Oct 15, 2010
This white paper gives some tips on how to manage data privacy and to prevent data breaches
Tags : 
data protection, dpa, security, it security, ico, data protection act
    
CS Risk Management & Compliance Ltd
By: Symantec     Published Date: Jun 29, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
trust marks, symantec, internet privacy, extended validation, norton secured seal
    
Symantec
By: Semcasting     Published Date: Aug 29, 2013
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, digital target, online marketing strategies
    
Semcasting
By: NetApp     Published Date: Jan 21, 2014
A private cloud needs to be built on a rock-solid data foundation. Learn why FlexPod is the solution of choice to enable an efficient and easily-managed cloud infrastructure. NetApp Privacy Policy
Tags : 
netapp, cloud computing, storage, private cloud array, best for company, flexpod, data management
    
NetApp
By: NetApp     Published Date: Mar 05, 2018
Read this comprehensive guide to the General Data Protection Regulation and learn how to comply with new regulations and address business implications, establish a holistic data compliance strategy and better manage your data through the lens of data privacy by design.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
By: Cloud Sherpas     Published Date: Nov 06, 2015
Watch this webinar replay to explore the principles that guide Google’s security and privacy policies in order to understand how going Google can transform your organisation without compromising security.
Tags : 
security, cloud, cloud computing, security cloud computing, security and privacy, google, google apps, application security
    
Cloud Sherpas
By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365
By: Thomson Reuters     Published Date: Mar 08, 2018
Although AI and big data have delivered advances in technology these past years which make remediation more manageable and more efficient, it’s important ensure that the solution you select, meets your particular requirements, addresses and meets your needs. Some jurisdictions require technology dealing with certain types of data to be hosted on-site; data hosting, exchange, protection and privacy can all affect the choice of solution or vendor. It’s common for companies to call out these specifics in their RFPs. Other considerations include the level of precision and recall (e.g., the accuracy) required to meet project needs, the setup time for a system, its implementation and the ability to support globally dispersed team members.
Tags : 
technology, financial, sector, database, thomson, reuters
    
Thomson Reuters
By: CBRE     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
    
CBRE
By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
By: IBM     Published Date: May 16, 2017
When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
IBM
By: IBM     Published Date: Oct 26, 2017
Improper user access to applications can expose an organization to cyber attacks, with wide-ranging financial, social, public relations and legal implications for a compromised enterprise. To address these risks—and to meet regulatory requirements for authentication, data privacy and security—organizations sometimes find themselves wrestling with complex and costly access-management approaches.
Tags : 
critical data, access security, user experience, it strategy, identity federation
    
IBM
By: Juniper Networks     Published Date: Jun 22, 2017
As the pressures of digital disruption force companies to either transform or die, companies in Asia’s BFSI sector are rushing to integrate cutting-edge technologies and roll-out innovative new services to their customers. Fortunately, thanks to rapidly advancing technologies, developments in the regulatory landscape and the initiative of leading BFSI organisations, we are seeing incredible examples of innovation within the sector on a monthly, if not weekly, basis. To celebrate this trend, we will showcase in this article a selection of the latest and greatest innovations offered by Asia’s leading BSFI organisations, which we believe represent the future of BFSI services not just in the region, but worldwide.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
By: Juniper Networks     Published Date: Jun 29, 2017
The ongoing success of 7ticks depends on having an IT infrastructure that adapts and scales to unforgiving reliability, performance, and transparency requirements. To support the torrid growth of data, 7ticks needed to expand the IP/MPLS network connecting its data centers to 40 Gbps—and have an immediate path to 100 Gbps and beyond. Within its data centers, 7ticks needed network and security solutions that would keep pace—and would simplify service management and support automation. “Our biggest challenge is performance at scale,” says Scott Caudell, founder of the 7ticks business and vice president of IT infrastructure at Interactive Data. “IT is our business. The 7ticks infrastructure helps customers get a lower time to market and faster execution speeds at a cost that’s sustainable for their businesses.”
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Juniper Networks
By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : 
gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
    
CA Technologies EMEA
By: McAfee EMEA     Published Date: Mar 14, 2018
Angesichts zahlreicher geltender Vorschriften sind Unternehmen der Meinung, dass Datenschutz einen Wettbewerbsvorteil bringt. Aber sind sie auch in der Lage, die Vorgaben der neuen DatenschutzGrundverordnung einzuhalten? Folgende Sorgen und Strategien haben uns mehr als 800 hochrangige Führungskräfte aus verschiedenen Branchen und Ländern genannt.
Tags : 
    
McAfee EMEA
By: DocuSign UK     Published Date: Aug 08, 2018
"The General Data Protection Regulation (GDPR) is one example of the evolving regulatory landscape in the digital age. Since the European Union (EU) adopted the regulation in 2016, DocuSign has been investing to be compliant across its entire business, building upon our foundation and history of commitment to privacy. The conception of the GDPR undoubtedly introduced a number of compliance challenges for businesses to address around data privacy and protection. It also presented an opportunity for businesses to build trust with their stakeholders by reconnecting with the people they serve. This eBook details DocuSign’s approach to meeting GDPR’s obligations that went into effect on 25th May 2018, for companies conducting business in the EU, and the features and benefits that can be gained from using the DocuSign solution to fulfil certain areas of the GDPR."
Tags : 
    
DocuSign UK
By: IBM     Published Date: Jul 05, 2018
IBM® Information Governance Catalog helps you understand your information and foster collaboration between business and IT by establishing a common business vocabulary on the front end, and managing data lineage on the back end. By leveraging the comprehensive capabilities in Information Governance Catalog, you are better able to align IT with your business goals. Information Governance Catalog helps organizations build and maintain a strong data governance and stewardship program that can turn data into trusted information. This trusted information can be leveraged in various information integration and governance projects, including big data integration, master data management (MDM), lifecycle management, and security and privacy initiatives. In addition, Information Governance Catalog allows business users to play an active role in information-centric projects and to collaborate with their IT teams without the need for technical training. This level of governance and collaboration c
Tags : 
    
IBM
By: Lenovo     Published Date: Sep 11, 2018
Three generations – Baby Boomers, Generation X, and Millennials – currently make up about 97% of the U.S. workforce, according to the U.S. Bureau of Labor Statistics. This white paper places a spotlight on Lenovo devices powered by Windows 10 Pro that allow such a diverse workforce to thrive. By completing this form, you have agreed to receive marketing communications from Lenovo and are providing express consent to receive these messages. You may unsubscribe at any time using the link included in each email message. To learn more about our privacy policy, visit the Lenovo Privacy page.
Tags : 
    
Lenovo
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter