How to Establish Data Masking Standards [GDPR Step 7]

The General Data Protection Regulation (GDPR) recognizes that some personal data can reveal a person’s identity, while other data may be processed or stored in a way that keeps the identity confidential. Data masking is an important part of GDPR compliance.

View Now

How to Confirm Data Owners [GDPR Step 3]

In the context of General Data Protection Regulation (GDPR), data owners are accountable for the quality, integrity, and protection of the data they own. Establishing data owners is an important step for GDPR compliance.

View Now

The Importance of Creating Data Taxonomy [GDPR Step 2]

With GDPR coming into effect, creating data taxonomy—the classification of data into categories and subcategories—is vital. Data taxonomy makes it easier to run profiling, clean data, and employ common terminologies and semantics across systems.

View Now

What is Machine Learning?

Machine learning is a technique that uses statistical probabilities to give computers the ability to “learn” over time via exposure to various external inputs.

View Now

AI vs Machine Learning vs Deep Learning

AI is machines mimicking human intelligence to perform tasks. Machine learning (ML) is an AI subfield where computers learn from big data without programming. Deep learning, a subset of ML, builds abstractions from datasets to construct meaning.

View Now

What is Data Management?

Data management refers to the professional practice of constructing and maintaining a framework for ingesting, storing, mining, and archiving the data integral to modern business. Discover 7 types of data management, the benefits of doing it right, 3 best practices, and how to find the right tools.

View Now

How an ESB Simplifies Application Integration

Today, innovative organizations are embracing the Enterprise Service Bus (ESB) because it addresses all the headaches, roadblocks, and error that stems from the P2P integration style, and makes application integration headaches a thing of the past.

View Now

How to Manage End-User Computing [GDPR Step 13]

The General Data Protection Regulation (GDPR) addresses the security of the processing personal data. This requirement for data protection also applies to end-user computing (EUC) applications. Companies need to convert to another automation system or manage data protection within an EUC app.

View Now

Pillars to GDPR Success: Data Access and Portability (5 of 5)

The GDPR gave consumers more rights to own their own data, and part of those provisions require organizations to provide access at any time. The final pillar of our 5 Pillars to GDPR Compliance philosophy is providing data access and portability, as a means to respect the data subject’s rights.

View Now