Your search results for

41 results:
31. Payments   Big Data security solutions from comforte provide your business with comprehensive protection for big data environments.  
32. Privacy Policy   … The relevant legal basis for the temporary storage of data and log files is Art. 6 Sec. 1 lit. f GDPR. 3. Duration of storage, possibility of objection and elimination Cookies are stored on the…  
33. Privacy Policy   … data is after registration and the user's consent to receive the newsletter Art. 6 Sec. 1 lit. a GDPR. 3. Purpose of data processing The collection of the user's e-mail address serves to send the…  
34. Privacy Policy   … data is after registration and the user's consent to receive the newsletter Art. 6 Sec. 1 lit. a GDPR. 3. Purpose of data processing The collection of the user's e-mail address serves to send the…  
35. Privacy Policy   comforte's Privacy Policy  
36. Reduce Breach Impact   … now averaging $4.45M per incident (IBM, “Cost of a Breach Report”, 2024) Regulatory penalties under GDPR, PCI DSS, HIPAA, DORA Lost trust, customer churn, and reputational harm Shrink the blast radius by…  
37. Retail   Big Data security solutions from comforte provide your business with comprehensive protection for big data environments.  
38. Whitepaper: comforte AG SecurDPS - Enterprise Solution for GDPR   …Whitepaper: comforte AG SecurDPS - Enterprise Solution for GDPR The European Union’s General Data Protection Regulation (GDPR) mandates a prescribed level of personal data security for residents of the EU, with punitive…  
39. Whitepaper: PCI DSS as a Foundation for GDPR Compliance   …Whitepaper: PCI DSS as a Foundation for GDPR Compliance For companies striving to become GDPR compliant, the PCI DSS can used as a useful point of reference for a number of GDPR requirements. While far from identical,…  
40. Whitepaper: The Choice is Yours - Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance   …Whitepaper: The Choice is Yours - Adopt Data-centric Security or Risk GDPR and PCI Non-Compliance By adopting a truly effective data security strategy, organizations can avoid financially crippling, reputation-shredding…  
Search results 31 until 40 of 41