dp and

Results 201 - 225 of 574Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 07, 2018
Learn about the top needs and challenges for GDPR compliancy and how IBM resolves these challenges with a security first cloud approach.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 07, 2018
Are you GDPR ready?Leadership teams must understand GDPR implications and how to avoid falling foul of the new law.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
Trust can be viewed as a key factor amongst clients and service providers working together towards preparing for readiness with the EU General Data Protection Regulation (GDPR). These stringent regulations come into force in May 2018 to ensure that personal data is processed adhering to strict privacy and security requirements.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
    
Group M_IBM Q418
Published By: Carbon Black     Published Date: Mar 27, 2019
Cyberattacks are rapidly evolving. It is more critical than ever that your company be protected by the latest innovations in endpoint security. And if you’re dealing with outdated antivirus solutions, your risk of experiencing damaging attacks is increasing exponentially.
Tags : 
    
Carbon Black
Published By: ServiceNow     Published Date: Sep 18, 2018
Worldpay deployed ServiceNow Performance Analytics to replace multiple data tools and promote the use of analytics throughout its organization for improved decision making. Nucleus found the project enabled the company to boost analyst productivity, while simultaneously increasing data accessibility and engagement for hundreds of additional employees. Download this case study to learn more
Tags : 
nucleus, research, worldpay, servicenow
    
ServiceNow
Published By: TIBCO Software     Published Date: Jul 22, 2019
FINANCIAL SERVICES’ HISTORY OF DISRUPTION Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
    
TIBCO Software
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
As a secure internet gateway, Cisco Umbrella helps you tackle the challenges of mobility, SaaS, and branch transformation by offering a single platform that secures access to and use of the cloud, SaaS applications, branch offices, and endpoints. It's your first line of defense against threats -- anytime and anywhere your users access the internet, traffic goes through Umbrella first. To understand how a secure internet gateway provides 360-degree security for access to and use of the cloud, read the ebook.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Jan 08, 2019
IBM has established a global readiness programme tasked with identifying the key impacts of the GDPR across IBM’s business and preparing IBM’s internal processes and commercial offerings for compliance with the GDPR.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it’s up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms—for example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry’s first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization’s digital business transformation—no matter what endpoints your enterprise is putting to work."
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: May 21, 2019
The age of digital transformation is firmly here, and with it comes a seismic shift in how businesses must operate if they intend to stay relevant and profitable. Though the role of process in digital transformation is often over-hyped, in truth, it remains a critical element in the fight to win, serve, and retain customers. In this digital age, businesses must holistically reframe their investment in process automation. In short, a compelling vision for process excellence must underpin this digital transformation, thereby transforming customerfacing processes and digitizing operational processes. The change is so profound that Forrester has renamed the category from business process management (BPM) to digital process automation (DPA). This shift, while continuing to drive down costs and drive up employee productivity, makes customer experience and digital transformation the primary success factors. This represents a powerful and necessary change of focus. In July 2017, IBM commission
Tags : 
    
Group M_IBM Q2'19
Published By: Kaseya     Published Date: Mar 01, 2019
The increasing number of endpoints and the growing complexity of IT landscape brings in the need of having a unified method of managing IT. Unified Endpoint Management (UEM) gives organizations a simple, flexible way to manage and secure endpoints from an all-in-one single platform. With capabilities such as centralized discovery and management, automation and remote control, UEM equips enterprises to address complex problems encountered by IT in the current landscape. Download this ebook to learn how to enable your IT teams to eliminate roadblocks and increase productivity and move forward on their way to the digital transformation of the enterprise. Few salient points: -The challenges faced by modern IT teams -How Unified Endpoint Management helps address these challenges -Benefits of Unified Endpoint Management in the enterprise -Kaseya’s approach to UEM
Tags : 
    
Kaseya
Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous t
Tags : 
    
Trend Micro
Published By: ConnectWise     Published Date: Aug 22, 2019
The goal of automation is not to eliminate or replace human labor, but to increase productivity and quality beyond what is possible with your existing team, so as to realize economies of scale and predictable quality levels. With automation, your team is able to manage more endpoints, because automation eliminates routine and mundane responsibilities or efforts, giving your technicians the time to focus on higher priority and more complex tasks. In addition, as a managed service provider (MSP), you receive a fixed fee for your services. As a result, you need to provide service in the most efficient way possible while delivering the highest levels of consistency and quality. Building automation into your IT services business will enable you to do so. In this eBook, you’ll learn tips and best practices to successfully incorporate automation into your IT services business, including:
Tags : 
    
ConnectWise
Published By: ConnectWise     Published Date: Aug 22, 2019
There is a better way to master your client’s network, and it all begins with better network management strategies and tools that go beyond endpoint management alone. With these new solutions, you can drive down wait times through dynamic self-help options, see all of the device connections to take action before something goes wrong, and script out solutions for common problems—all from information in one easy and convenient place.
Tags : 
    
ConnectWise
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DDoS attacks increase by over 100% year over year. What’s scarier is that 82% of enterprises described DDoS attacks as crippling to their business. In order to have a secure disaster recovery plan and overcome these increasingly sophisticated threats you need a highly resilient and scalable DNS infrastructure. Download this quick guide and learn: • Common types of DDoS attacks and which layers of your infrastructure are most at risk • How to geographically isolate attacks and mitigate latency when you have multiple endpoints • How to get the best before, during and after attack protection Get the guide! "
Tags : 
    
Oracle + Dyn
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Organization: Arup Headquarters: London, England Users: 13,500 Objective: Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with nextgen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Solution: Cisco Umbrella, Cisco Umbrella Investigate & Cisco AMP for Endpoints Impact: • Substantially reduced administrative time • Accelerated response and remediation process • Increased performance of cloud applications • Reduced time to investigate
Tags : 
    
Cisco Umbrella EMEA
Published By: Canon Business Process Services, Inc.     Published Date: Aug 17, 2015
This paper will explore the potential of applying business performance management (BPM) principles to advance document performance management (DPM) in a way that enables organizations to reduce costs; better manage documents as vital strategic, ?nancial and information assets; and secure positive returns on investments from outsourcing. An example of this approach — spotlighted later in this paper — is MAX, a document performance management system that enables companies to more effectively manage their document processes and outsourcing service providers.
Tags : 
canon business process services, document management, document imaging, business performance management, outsourcing services, managed services, balanced scorecard framework, slas
    
Canon Business Process Services, Inc.
Published By: SAS     Published Date: May 24, 2018
Compliance doesn’t have to be a scary word, even when facing the multifaceted challenges of the European Union’s General Data Protection Regulation. In fact, following through with plans for sustainable GDPR compliance can have many long-term benefits for your organization. That's because relying on data-driven decisions across the board sets you on track to gain a competitive edge. In February 2018, SAS conducted a survey with 183 global, cross-industry businesspeople involved with GDPR at their organizations. Based on the survey results, this e-book delves into the biggest challenges and opportunities organizations have faced on the road to GDPR compliance. Read on for advice from industry experts about the best path to compliance. Learn what steps your peers across a variety of industries have already taken and discover how an integrated approach from SAS can continue to guide your journey toward GDPR compliance.
Tags : 
    
SAS
Published By: Promisec     Published Date: Mar 20, 2012
One of the greatest challenges to enforcing IT security and compliance lies at the endpoints, especially within Microsoft infrastructures. Learn how agentless technology has become mandatory in seeing, analyzing, and fixing Windows endpoint issues.
Tags : 
endpoint, endpoint management, endpoint control, compliance, it compliance, security, security compliance, agentless
    
Promisec
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library