compliance

Results 26 - 50 of 1973Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Jun 27, 2019
MuleSoft’s Government Cloud is an industry-leading FedRAMP-compliant cloud environment for building and deploying APIs and integrations with Anypoint Platform. MuleSoft’s US Federal Risk and Authorization Management Program (FedRAMP) compliant-solution enables government agencies to build and secure connections between their applications and citizen data. Download this whitepaper to learn: How MuleSoft’s Government Cloud enables agencies to increase project delivery speed by 3x. Why FedRAMP compliance reduces on-premises infrastructure costs. How government agencies can develop, deploy, manage, and monitor integrations and APIs in the cloud to rapidly expand cloud services.
Tags : 
    
MuleSoft
Published By: Adobe     Published Date: Jun 26, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to use it.
Tags : 
    
Adobe
Published By: Red Hat     Published Date: Jun 26, 2019
When any organization starts planning for cloud-native applications, it is important to consider the entire time span: from selecting a development platform until an application is truly production-grade and ready for delivery in the cloud. It can be a long journey, with many decisions along the way that can help or hinder progress. For example, at the beginning of a move to cloud-native development, it is easy for inefficiencies to occur if developers begin selecting tools and frameworks before they know where the application will be deployed. While enterprise developers want choice of runtimes, frameworks, and languages, organizations need standards that address the entire application life cycle in order to reduce operational costs, decrease risks, and meet compliance requirements. Organizations also want to avoid lock-in, whether it is to a single provider of cloud infrastructure or the latest architectural style. In addition, given the steep learning curve in cloud development, con
Tags : 
    
Red Hat
Published By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
    
IBM APAC
Published By: Red Hat     Published Date: Jun 19, 2019
IT and business are changing rapidly. Growth opportunities in new markets, evolving customer behaviors and preferences, increased competitive pressure, and new standards in regulatory compliance are causing organizations to adapt their operations and processes.1 Even so, rigid legacy IT infrastructure can keep you from adjusting to change and reduce the business value of IT. These complex environments often limit flexibility, speed, and scalability, resulting in slow application and service delivery. As a result, your organization can experience broad effects, especially within your IT operations and development teams. Developers need resources to be provisioned and scaled quickly so they can begin work immediately when an idea strikes. They also want more control over those resources while they are in use. However, with complex, hard-to-manage environments and manual processes, IT operations teams often struggle to provide resources and services at the speed that developers demand. Th
Tags : 
    
Red Hat
Published By: SailPoint Technologies     Published Date: Jun 18, 2019
Your college or university probably has hundreds of systems and applications containing sensitive data. Find out how cloud identity governance can close your security gaps by telling you where these files reside, what each file contains and who can access this data. Download the Report
Tags : 
    
SailPoint Technologies
Published By: AppZen     Published Date: Jun 17, 2019
Modern finance teams are embracing AI to audit their invoice-based spend. With AI, they can review all of their invoices prior to payment to spot errors, fraud, and contract violations. AppZen customers have identified 16 critical invoice audit and contract compliance use cases that only AI can make possible.
Tags : 
    
AppZen
Published By: Beqom     Published Date: Jun 12, 2019
Get the overlooked lessons that will help you go digital successfully HR and sales leaders are challenged to streamline the compensation process while attracting and retaining top talent, supporting business strategy, and maintaining regulatory compliance. Fill out the form to instantly download our free eGuide and learn where the most successful digital compensation transformations get it right.
Tags : 
    
Beqom
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: Dell EMC Storage     Published Date: Jun 10, 2019
Die Automobilindustrie befindet sich mitten in einer hart umkämpften Übergangsphase, deren letztendliches Ziel darin besteht, innerhalb eines Jahrzehnts vollständig autonome oder „fahrerlose“ Fahrzeuge zu realisieren. Die Größenordnung und Intensität, mit der OEMs und Tier1-Lieferanten Innovationen auf den Markt bringen und gleichzeitig Kosten eindämmen, Risiken mindern, die Produktkomplexität managen und die Compliance aufrechterhalten müssen, bedeuten eine große Herausforderung. Die Entwicklung von Fahrerassistenzsystemen (Advanced Driver Assistance Systems, ADAS), die die Sicherheit von Insassen, Fahrzeugen und Straßen verbessern sollen, bringt revolutionäre Anforderungen an die Engineering-IT-Infrastruktur mit sich–insbesondere für Speicher, bei dem selbst Entry-Level-Kapazitäten in Petabyte gemessen werden. In diesem Whitepaper werden die Infrastruktur-herausforderungen erkundet, vor denen OEMs und Tier1-Lieferanten bei der Entwicklung und Validierung vonADAS-Technologien steh
Tags : 
    
Dell EMC Storage
Published By: Gigamon     Published Date: Jun 10, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon
Published By: Forcepoint     Published Date: Jun 06, 2019
In today’s average large enterprise, more than 1,000 cloud applications may be in use—whether sanctioned or unsanctioned by IT. But traditional security technologies can’t adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Traditional security infrastructures can't keep up with the growing complexity of today's distributed networks. To power true digital transformation via the cloud, you need to integrate connectivity and security in a way that allows for higher productivity, reduced costs, and easier compliance. Download our eBook to learn about a better approach to cloud security, including how to augment or replace expensive MPLS, the types of security needed for holistic protection, and the advantages of an integrated solution instead of a patchwork of point products.
Tags : 
    
Forcepoint
Published By: Citrix Systems     Published Date: Jun 04, 2019
As companies scale, they add solutions leaving employees having to deal with multiple gateways or access points to get to their applications, apps, and data. It creates a poor user experience, slows productivity, and opens organizations to security risks. With Citrix Workspace, IT is able to simplify connections with remote access while maintaining security and control. Download our e-book and find out how we can: Provide users with one access point and single sign-on (SSO) Ensure secure access to apps in the data center, cloud, or delivered as SaaS applications across any device Help IT reduce complexity and meet compliance and security policies
Tags : 
    
Citrix Systems
Published By: Oracle     Published Date: Jun 04, 2019
Finance leaders believe data management is a burden on businesses. Yet less than half of organisations have a data management strategy in place. But data management strategies positively impact security across all lines of business. Poor data management practices inevitably lead to poor outcomes, with bad decisions based on bad data. Data must also be protected, with weak practices leading to cyber breaches. And the reputational damage to an organisation’s brand cannot be underestimated. However, when managed well, data offers a competitive advantage. In the past, data was typically informed historical reporting, with internal needs and compliance taking priority. There is a new data paradigm. Data is the new currency in the digital age.
Tags : 
    
Oracle
Published By: Nuance EMEA     Published Date: Jun 04, 2019
New market entrants are shifting the way the financial sector operates, new business models are changing customer expectations, and ever-changing client demographics are forcing businesses to adapt the way they work. As we move into a decade of artificial intelligence (AI) and digital innovation, huge opportunities are opening up for the financial sector to combat these changes. But with this comes new challenges, and exponential increases in available information must be accompanied by smart tools and processes to make sense of it, ensure regulatory compliance, and add real value to clients. To find out more, download this ebook!
Tags : 
    
Nuance EMEA
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and
Tags : 
    
AWS
Published By: Sage EMEA     Published Date: May 31, 2019
Drive digital transformation through data and financial compliance.
Tags : 
    
Sage EMEA
Published By: Sage EMEA     Published Date: May 31, 2019
Making Tax Digital (MTD) is part of a global trend. Governments around the world are making moves to implement electronic data submission and auditing requirements. It makes sense for them, of course – governments say that they are losing billions in tax revenue every year due to non-compliance, whether that’s through simple error or conscious fraud.
Tags : 
    
Sage EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: