The General Data Protection Regulation – or GDPR – is a European
Union (EU) law that protects the rights of individuals with respect to
their data. Adopted as an EU law in April 2016, organizations that hold
data about any resident of the EU must be compliant by May 2018.
With attention-grabbing fines of €20 million or 4% of global annual
turnover, GDPR commands attention at the highest levels. And despite
the “legalese” that compliance suggests brands utilize, the brands that
balance legal compliance with a human approach will turn GDPR to
This white paper provides a series of actions you can take to make
the most of GDPR to both enhance your customer relationships and
As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new General Data Protection Regulation (GDPR)? Here are the concerns and strategies of 800+ senior executives from industries around the world.
Data in a Turbulent World Nearly half of organizations say they will migrate data as a result of regulation or changing government policies.
Data Protection as a Competitive Advantage A significant majority of respondents believe proper data protection will attract new customers.
Download our full report, Beyond GDPR: Data residency insights from around the world.
The General Data Protection Regulation (GDPR) will deliver a long overdue modernization and harmonization of privacy and data protection laws across the EU. It replaces legislation that was drafted before phones became smart and the cloud came to transform business.
This guide will help you prepare for the GDPR. It outlines the key facts and figures, the questions organizations should ask to help assess their stage of readiness, and a comprehensive toolkit to help develop the capabilities needed to become GDPR-ready. Finally, we offer a short reference sheet covering the key information security professionals need to be prepared.
As the use of cloud solutions in government increases, both business and IT leaders are recognizing that the safety and success of their business depend on finding ways to take full advantage of cloud innovation while ensuring consistent service levels, data management and privacy, and user experiences. Hybrid IT management includes aligning the organization around service levels, cost control, security, and IT-enabled innovation.
Despite momentous benefits, cloud computing has its own set of challenges that must be addressed. The primary concern that many enterprises and end users have is related to security, especially data protection and privacy and loss of control. This article discusses the several challenges associated with security for cloud-based video conferencing and how organizations can remove these barriers by adopting solutions that implement security as a key tenet.
Published By: Delphix
Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial.
Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
This infographic includes results from a 2015 survey conducted exclusively for CBS Interactive and illustrates:
• The top-ranked security threats of 2014
• The percentage of companies adopting mobile security technology
• The most popular data protection methods
• What to look for in a comprehensive data protection solution
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
The rampant rise in cyberattacks and the growing concerns and regulations over data privacy are compelling the increased use of SSL/TLS. But managing even more SSL/TLS to protect data is challenging. See how you can safely expand and rely on SSL/TLS to achieve your data security and privacy goals.
My name is Jonathan McCaffrey and I work on the infrastructure team here at Riot. This is the first post in a series where we’ll go deep on how we deploy and operate backend features around the globe. Before we dive into the technical details, it’s important to understand how Rioters think about feature development. Player value is paramount at Riot, and development teams often work directly with the player community to inform features and improvements. In order to provide the best possible player experience, we need to move fast and maintain the ability to rapidly change plans based upon feedback. The infrastructure team’s mission is to pave the way for our developers to do just that - the more we empower Riot teams, the faster features can be shipped to players to enjoy.
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Published By: Infomatica
Published Date: Jul 15, 2015
UPMC is a cutting edge leader in harnessing the power of technology and accelerating innovation. This case study explores how UPMC was able to integrate clinical, financial, administrative, genomic and other information and use this data to:
• Improve research outcomes in search of cures and other diseases
• Determine the true cost of providing care with longitudinal patient records
• Examine clinical practice variations to benchmark and improve future procedures
• Strengthen information security, privacy and compliance capabilities
Published By: IBM APAC
Published Date: Sep 25, 2017
As technology has progressed companies have always taken advantage of it to evolve how they engage with their customers. But today, something different, more fundamental is happening. How shoppers and buyers want to interact and transact with companies is changing dramatically, driven by the fusion of physical and digital channels.
Published By: Workday UK
Published Date: Mar 07, 2018
The clock is ticking: A year from today, the EU’s General Data Protection Regulation (GDPR) will take effect. With that in mind, now is a good time to talk about how Workday offers tools that help customers meet their GDPR obligations.
But first, here’s a brief refresher: The GDPR is an EU regulation meant to harmonize the patchwork of data protection laws in Europe. The GDPR repeals and replaces not just the current EU data protection directive, but also the Byzantine system of privacy legislation that each EU member state enacted under that directive.
Published By: MobileIron
Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
As the pressures of digital disruption force companies to either transform or die, companies in Asia’s BFSI sector are rushing to integrate cutting-edge technologies and roll-out innovative new services to their customers.
Fortunately, thanks to rapidly advancing technologies, developments in the regulatory landscape and the initiative of leading BFSI organisations, we are seeing incredible examples of innovation within the sector on a monthly, if not weekly, basis.
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today.
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Published By: Proofpoint
Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Published By: MobileIron
Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such
as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.