regulatory

Results 1 - 25 of 463Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Sep 04, 2019
Operational resilience is high on the regulatory agenda in the UK. A joint discussion paper in 2018 took a broader view of operational resilience to cover all risks to the provision of critical business services with a greater emphasis on recovery and response when incidents occur. Regulators now place the same importance on operational resilience as on financial resilience. This represents a fundamental shift that companies are at different stages of addressing. Based on discussions with clients and regulators here are ten conversations to help guide you through this new landscape.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Forces such as consumerisation, expanding regulatory requirements and the shift to outcome-based pricing are all compelling procurement leaders to re-evaluate strategies. Read this briefing to find out: • the key disruptors shaping the future of procurement • how to develop an agenda to deal with disruption • seven key areas of difference between current and future procurement models • essential questions to inform your strategic thinking.
Tags : 
    
KPMG
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network. In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks. View our infographic to find out who they’re targeting and how to protect your network. "
Tags : 
    
Cisco Umbrella EMEA
Published By: TIBCO Software     Published Date: Jul 22, 2019
FINANCIAL SERVICES’ HISTORY OF DISRUPTION Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
The biggest headache for most payment operations teams is cost control — and a large part of it comes from fraud management: Investigation teams waste large amounts of time just assembling the data needed to make decisions. Detection engines are always playing catchup with the latest fraud patterns. Ever changing regulations increase the time and cost required to reach compliance and meet audit standards. Given their scope and impact, replacing core fraud systems is not an option for most firms. But instead of replacing them, you can improve the investigative process with augmented investigation, and improve the detection process by enhancing current systems. This whitepaper describes three ways financial services firms can use TIBCO solutions to lower the cost of investigations through faster results, reduce fraud losses through better detection, and simplify audit and regulatory compliance through centralized access to information.
Tags : 
    
TIBCO Software
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: StoryDesk     Published Date: Mar 28, 2012
How can you use the iPad in your organization? What's the formula for a successful iPad deployment? What do you need to know about regulatory requirements, security, HTML5, and custom apps?
Tags : 
emerging marketing
    
StoryDesk
Published By: HPE & Intel®     Published Date: Oct 10, 2016
In the financial services industry (FSI), high-performance compute infrastructure is not optional; it’s a prerequisite for survival. No other industry generates more data, and few face the combination of challenges that financial services does: a rapidly changing competitive landscape, a complex regulatory environment, tightening margin pressure, exponential data growth, and demanding performance service-level agreements (SLAs).
Tags : 
    
HPE & Intel®
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
Published By: Coupa     Published Date: Dec 14, 2018
Financial services firms are turning to Business Spend Management (BSM) as a Strategic Solution Beset by competitors and burdened by ever-shifting regulatory requirements, financial services firms are turning to cloud-based technology to gain better control over—and visibility into—spending. In the process, they are becoming fiercer competitors. Download this ebook for insights into how you can improve your organization's financial health and how: A cloud complete-BSM solution can track and measure all purchasing activities, identifying patterns that provide opportunities for negotiating discounts, and better managing risk To increase savings across source-to-contract, procure-to-pay, travel & expense management, as well as risk and supplier management Modern technology enables the finance function to take cost-management to a deeper level—without investing in IT infrastructure
Tags : 
    
Coupa
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
An optimized hybrid IT infrastructure enables innovative business outcomes—but rapid IT transformation also creates new risks, threats and vulnerabilities. Coupled with increasingly sophisticated cyberattacks and complex regulatory pressures, managing risk in today’s digital environment becomes even more critical to the enterprise. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Commvault     Published Date: Jul 06, 2016
Unsanctioned file sharing creates serious security and regulatory compliance issues. Read this infographic to learn how to sync, share and control data securely!
Tags : 
commvault, data security, protecting corporate data, commvault file sharing, virtual host costs, virtualization
    
Commvault
Published By: FICO     Published Date: May 11, 2017
Competing in telecommunications markets is becoming extremely complicated. Responding to disruptive change from many directions, telecom companies are experimenting with new business models and offering new types of services. With this comes the potential to draw new waves of regulatory oversight, further complicating the picture.
Tags : 
customer experience, customer management, telecom, customers
    
FICO
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: SAP     Published Date: Oct 11, 2018
Life sciences is an industry on the move. Driven by regulatory changes, manufacturing capacity, and margin pressures, the industry’s supply chain and procurement leaders are relying heavily on contract manufacturing organizations (CMOs). These relationships require new ways of managing product quality and costs across the supply network. Learn how a true digital strategy can optimize internal and external processes – and extend them beyond the enterprise – so you can excel in today’s complex market.
Tags : 
    
SAP
Published By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: SAP Ariba     Published Date: Oct 11, 2018
Life sciences is an industry on the move. Driven by regulatory changes, manufacturing capacity, and margin pressures, the industry’s supply chain and procurement leaders are relying heavily on contract manufacturing organizations (CMOs). These relationships require new ways of managing product quality and costs across the supply network. Learn how a true digital strategy can optimize internal and external processes – and extend them beyond the enterprise – so you can excel in today’s complex market.
Tags : 
    
SAP Ariba
Published By: Qatar Financial Centre     Published Date: Jun 20, 2019
Qatar offers a thriving, state-of-the-art environment for organisations looking to capitalise on all the MENA region has to offer and expand their business in Qatar and beyond. The QFC is there every step of the way, helping with easy setup, access to experts from around the world and an unmatched taxation, legal and regulatory environment. The QFC also plays a key role in attracting foreign investment by providing a first-class legal system based on English common law, and a competitive location to grow revenue with one of the most compelling tax environments in the world.
Tags : 
    
Qatar Financial Centre
Published By: Digital Realty     Published Date: Feb 24, 2015
Enterprise data center clients operate in some of the most complex and regulated environments in the world. These clients need assurance that their partners are up to the challenge of meeting their needs and operating effectively within a dynamic ecosystem. For the client-focused data center solutions provider, this presents a perfect opportunity to differentiate its services from those of other solution providers who simply provide five 9’s. See how they manage the regulatory landscape.
Tags : 
compliance, data center, management
    
Digital Realty
Published By: Dell EMC     Published Date: May 12, 2016
Businesses face greater uncertainty than ever. Market conditions, customer desires, competitive landscapes, and regulatory constraints change by the minute. So business success is increasingly contingent on predictive intelligence and hyperagile responsiveness to relentlessly evolving demands. This uncertainty has significant implications for the data center — especially as business becomes pervasively digital. IT has to support business agility by being more agile itself. It has to be able to add services, scale capacity up and down as needed, and nimbly remap itself to changes in organizational structure.
Tags : 
    
Dell EMC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: