CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

regulations

Results 176 - 200 of 326Sort Results By: Published Date | Title | Company Name
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: Talend     Published Date: Nov 02, 2018
The rise of data privacy regulations and the increasing risk of data theft have made data protection an essential part of any data-driven strategy. This executive summary gives you a quick overview of the risks and regulations related to data privacy, and a framework for addressing both without compromising on customer experience.
Tags : 
    
Talend
Published By: Equinix APAC     Published Date: Feb 25, 2019
The Edge Completes the Cloud Edge computing delivers the decentralized complement to today’s hyperscale cloud and legacy data centers. To maximize application potential and user experience, enterprise architects and technology innovation leaders need to plan distributed computing solutions. Enabling this thinking is that although the cloud is becoming mainstream, that does not imply that all workloads will be placed in the cloud during the next decade or so. Technical incompatibilities, decades of embedded business logic in mainframe applications, government regulations and simple economics all conspire to keep some workloads out of the cloud, driving us toward a hybrid multi cloud future.
Tags : 
    
Equinix APAC
Published By: Procore     Published Date: May 13, 2019
As the construction industry becomes more competitive, regulations increase and skilled labour becomes more selective; the one thing that will define your company from the competition is your data. The best companies use real, situational data in pre-task analyses daily to report on and improve their Quality, Safety and Productivity processes and performance. Download your copy to learn: • The importance of including quality, safety and productivity in your pre-task analyses • Using the three-part task-analysis approach • How to collect meaningful data to track performance
Tags : 
    
Procore
Published By: SafeNet     Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
Tags : 
safenet financial services, online banking threats, cyber attack, compliance, financial services providers, authentication, phising, application security, auditing, identity management, internet security, intrusion detection, intrusion prevention, password management, phishing
    
SafeNet
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps, small business, finance
    
Cisco
Published By: McAfee EMEA     Published Date: Mar 14, 2018
As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new General Data Protection Regulation (GDPR)? Here are the concerns and strategies of 800+ senior executives from industries around the world. Data in a Turbulent World Nearly half of organizations say they will migrate data as a result of regulation or changing government policies. Data Protection as a Competitive Advantage A significant majority of respondents believe proper data protection will attract new customers. Download our full report, Beyond GDPR: Data residency insights from around the world.
Tags : 
    
McAfee EMEA
Published By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : 
compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management, sarbanes oxley compliance
    
Computhink
Published By: DataMotion     Published Date: Oct 01, 2008
With HIPAA audits now randomized, you must be prepared for them every day. And with state regulations requiring compliance-breach reporting, you must become your own auditor. HIPAA is the Health Insurance Portability and Accountability Act, the 1996 federal regulation that mandated health-data privacy.This regulation requires compliance by all insurers and health care providers, including physician’s offices, hospitals, health plans, employers, public health authorities, life insurers, clearinghouses, billing agencies, information systems vendors, service organizations, and universities.But that’s not all.
Tags : 
certifiedmail technology, act's privacy rule, health insurance portability, accountability act, security, it management, data management, firewalls
    
DataMotion
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption, compliance, data encryption, data protection, regulation compliance, efficiency
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Published By: OpenText     Published Date: May 22, 2018
Learn what enterprises like yours are doing to conquer compliance. And get all the latest compliance management trends and best practices.
Tags : 
opentext, gdpr, gdpr compliance, regulations, compliance, eu compliance, governance, internet security, security policies, pci compliance, employee training software, business technology
    
OpenText
Published By: Globality     Published Date: Apr 05, 2018
Frustration with high legal fees and demand for local regulatory knowledge may give boutique law firms an edge with larger clients.
Tags : 
globality, legal, compliance, regulations, local regulations, security management, security policies, financial management, business technology
    
Globality
Published By: Interactive Intelligence     Published Date: Jan 17, 2014
Learn about how the expanding guidelines for compliance have changed and how compliance has never been more relevant within the Accounts Receivable Management (ARM) industry.
Tags : 
compliance, cloud solutions, interactive intelligence, customer support, workforce management, data solution, customer experience
    
Interactive Intelligence
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
In this webcast, you will hear from an attorney specializing in Information Technology Law and a technology specialist who can help you sort through different solutions in the marketplace. You will learn how to adapt to the number of compliance regulations, data privacy laws, and court orders relating to electronic records.
Tags : 
it compliance, mainline information systems, information technology law, data privacy laws, government regulations, industry best practices, compliance
    
Mainline Information Systems
Published By: NACR     Published Date: Feb 09, 2015
Do you know what the compliance issues are for your organization and the technology solutions you might consider? Download this guide to learn what you need to know.
Tags : 
nacr, compliance, technology, technology solutions, regulations, software compliance – contact center, data security, customer security, hippa, biometrics, wfo, speech analytics, sarbanes-oxley, big data, telecommuting, remote agent, telemarketing, caller id, call recording, predictive dialers
    
NACR
Published By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : 
ibm, test data privacy, compliance, data masking, payment card industry, pci, security, database, anti spam, anti spyware, anti virus, pci compliance
    
IBM
Published By: GFI     Published Date: Jul 20, 2009
GFI MailArchiver is the #1 email archiving, management and compliance solution for Exchange Server. Perfect for the needs of SMBs, GFI MailArchiver is easily to install and requires minimal administrative effort.
Tags : 
gfi, smbs, mailarchiver, mail, administrative, email archiving, compliance, ediscovery, audit, regulations, security, auditing, email security
    
GFI
Published By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : 
pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft, credit cards, payment card, consumer protection, information management, regulations, regulatory compliance, netforensics, security, compliance, internet security
    
netForensics
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance, netforensics, compliance, security management
    
netForensics
Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : 
proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages, email security
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 23, 2010
Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.
Tags : 
email security, intrusion detection, intrusion prevention, secure instant messaging
    
Proofpoint
Published By: Quova     Published Date: Oct 27, 2008
Learn what real-time geolocation technology can do for online businesses. Discover how companies like yours are achieving cost-per-click improvements of up to 30 percent, while lowering home page drop-off rates by as much as 70 percent—and how you can do the same. Also, discover how knowing a Web visitor’s location can help you sell more product; increase customer loyalty; comply with state and country regulations; and track campaign effectiveness. Download your copy now.
Tags : 
quova, geolocation technology, quova, geolocation data, geographically targeted advertisement
    
Quova
Published By: ScriptLogic     Published Date: Aug 30, 2010
Managing the security and uptime of a Windows network requires you to master your Active Directory, the brain and heart of the network, with maximum efficiency. Active Administrator makes it simpler and faster than native Windows tools to exceed compliance regulations, tighten security, increase productivity, and improve business continuity.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore, policy management, policy based management, desktop management
    
ScriptLogic
Published By: ITinvolve     Published Date: Jun 01, 2012
Demonstrating PCI compliance with policies and regulations is an IT necessity, especially when periodic audits are conducted. ITinvolve has a better approach to change management with the capability to identify official PCI systems and their associated policies and documentation thus eliminating manual processes and reducing the risk of errors and delays.
Tags : 
it operations, information technology, audit, compliance, pci, governance, productivity, software compliance, business technology
    
ITinvolve
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search