IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

VoltageSuccess Story: Leading Supply Chain Data Analytics Solution Provider – Retail/Pharma

A leading supply chain data analytics solution provider needed to provide its large retail pharmacy clients with insights to enable product price optimization, store performance management, and targeted digital promotions to store customers.

Read more...
 
E-mail

VoltageTechnical Brief: Protecting Enterprise Data in Hadoop

Big Data is an exciting concept and emerging set of technologies that hold seemingly unlimited promise to enable organizations to gain new analytic insights and operational efficiencies. It is a unique architecture that enables low-cost, high-speed, parallel processing of huge data sets of structured and unstructured data.

Read more...
 
E-mail

Voltage WPProtecting Sensitive Data in Hadoop

Hadoop is a unique architecture designed to enable organizations to gain new analytic insights and operational efficiencies through the use of multiple standard, low-cost, high-speed, parallel processing nodes operating on very large sets of data. The resulting flexibility, performance and scalability are unprecedented. But data security was not the primary design goal.

Read more...
 
E-mail

VoltageMajor Provider of Insurance, Banking and Travel Products and Services

A leading provider of insurance, banking and travel products and services with over nine million customers in 11 states needed to secure terabytes of customer and corporate data.

Read more...
 
E-mail

Booz Allen HamiltonData-Centric Protection Service Offering

The Cost of a single successful cyber-security attack exploit is Significant and the Cost of Prevention is 1/10 the cost of an exploit.

Read more...
 
E-mail

VoltageUse Case: Data De-Identification

Neutralize data breaches: a new breed of cyber attacks—advanced malware, exploitation networks, and motivated insiders—are stealing sensitive data from vulnerable ecosystems. But companies can neutralize data breaches by rendering the data valueless, de-identifying data through encryption, tokenization, and data masking.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  Next 
  •  End 
  • »
Page 1 of 8

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner