Browse communities
Browse communities
Presenting a webinar?

IT Governance, Risk and Compliance

Community information
Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
  • Risk management is an increasingly important
    business driver and stakeholders have become
    much more concerned about risk. Risk may be a
    driver of strategic decisions, it may be a cause of
    uncertainty in the organisation or it may simply be
    embedded in the activities of the organisation. An
    enterprise-wide approach to risk management
    enables an organisation to consider the potential
    impact of all types of risks on all processes,
    activities, stakeholders, products and services.
    Implementing a comprehensive approach will
    result in an organisation benefiting from what is
    often referred to as the ‘upside of risk’.
    The global financial crisis in 2008 demonstrated
    the importance of adequate risk management.
    Since that time, new risk management standards
    have been published, including the international
    standard, ISO 31000 ‘Risk management –
    Principles and guidelines’. This guide draws
    together these developments to provide a
    structured approach to implementing enterprise
    risk management (ERM)
  • L’ambiente dei tuoi clienti è sempre più complesso, Backup Exec 15 permette loro di esguire backup e recovery in modo semplice ed efficace, sempre e ovunque.
    Segui questo webinar e scopri come Backup Exec 15 può semplificare e rispondere alle esigenze delle diverse infrastrutture.
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • Ingesting raw data into Hadoop is easy, but extracting business value leveraging exploration tools is not. Hadoop is a file system without a data model, data quality, or data governance, making it difficult to find, understand and govern data.

    In this webinar, Tony Baer, Principal Analyst of Ovum Research, will address the gaps and offer best practices in the end-to-end process of discovering, wrangling, and governing data in a data lake. Tony Baer will be followed by Oliver Claude who will explain how Waterline Data Inventory automates the discovery of technical, business, and compliance metadata, and provides a solution to find, understand, and govern data.

    Attend this webinar if you are:
    --A big data architect who wants to inventory all data assets at the field level automatically while providing secure self-service to business users
    --A data engineer or data scientist who wants to accelerate data prep by finding and understanding the best suited and most trusted data
    --A Chief Data Officer or data steward who wants to be able to audit data lineage, protect sensitive data, and identify compliance issues
  • Targeted malware, zero-day vulnerabilities and advanced persistent threats are increasingly responsible for data breaches. Why? Because they work. Most security products have a hard time protecting from advanced malware. This problem is compounded because attackers can easily mass produce new malware variants. What’s an IT person to do?

    Join us to learn key techniques to stop modern malware the first time. We will discuss:
    •What tactics work
    •Where to apply them
    •How to optimize cost, staffing and security.
  • Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:

    •Protect the infrastructure and easily recover if faults are found or predicted
    •Control access to data while meeting compliance and regulatory requirements
    •Deliver services quickly, resiliently, and cost-effectively

    Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
  • For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.

    Learn how moving from ClearCase to Subversion can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion migration techniques.

    Topics Covered:
    • Differences and similarities between Subversion and ClearCase
    • How to merge in Subversion
    • Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
    • ClearCase vs. Subversion in a distributed development environment
    • Migrating from ClearCase to Subversion
  • Recently cyber attacks against Industrial Control Systems (ICS) used by
    utilities and other Critical Infrastructure organizations have hit the
    newlines worldwide. Stuxnet is the best known cyber attack against an
    industrial installation, but it's not the only one.

    But what if cyber attacks were not the biggest threat to industrial
    networks and systems? Although malware is still a major point of
    interest, the sword of Damocles for critical industrial networks is
    represented by system misuse performed by disgruntled employees,
    contractors and vendors, as well as unintentional mistakes,
    network and system misconfiguration; all this could lead to the
    divergence or failure of critical processes.

    In this talk we will reshape the concept of ICS cyber security and will present our vision for a comprehensive approach to cyber security for ICS.
  • Adhering to international maritime sanctions requirements can be challenging in today’s regulatory landscape. Join Dow Jones Risk & Compliance and experts from HFW and Pole Star for a discussion on best practice in shipping compliance. Learn about regulatory developments -- including the latest UN Security Council communiques on "Sanctions compliance for the maritime transportation sector" -- and leverage case studies on the use of enhanced sanctions data and monitoring tools to mitigate sanctions risk.
  • As superfast connectivity becomes widely available, it will increase both data volume and velocity as well as new business opportunities. However, this dramatic leap forward will also result in new and potentially destructive activity online, which can affect an organisation’s defences both internally and within their supply chain. It has never been more important for businesses to assess and understand their critical infrastructure in an increasingly connected environment.

    During this webinar Steve Durbin, Managing Director of ISF Ltd, will discuss how businesses can update their resilience along with examining the role in securing the network boundary that investments in technology and third party provider programmes can play. This will necessarily include an assessment of cloud-based systems and the use of robust risk assessment methodologies.
  • An overview of how businesses can gain visibility into B2B transactions to speed decision-making, respond to changing customer and market demands, and optimize business processes.
  • The developed world's global Internet registries have officially depleted their supply of free IPv4 addresses. IPv6 is not just the future—it’s already here (65% of Verizon’s traffic is over IPv6!). Some organizations even have their IPv6 allocations already. But since a single site assignment in IPv6 contains 1 trillion, trillion, addresses (or 279 trillion Internets!), designing an effective plan can be both intimidating and unnecessarily time consuming. With that many addresses, where do you start? Join us for this webinar as Tom Coffeen, Infoblox IPv6 evangelist and O'Reilly author of IPv6 Address Planning, discusses how to design, deploy, and successfully adopt an effective IPv6 addressing plan. Both IPv4 exhaustion and IPv6 adoption are real and happening now. Take the first step to realizing an effective IPv6 address plan and adoption strategy, and watch this webinar today.
  • Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
    •DBA Burnout and Retention
    •The DBA’s Role in Major Platform Shifts and Regulatory Compliance
    •The Accidental DBA Due to Staff and Skills Shortages
    •The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
    •The IT Budget Crunch
    •Q & A
  • Join Cyveillance and Centripetal Networks as we explore the challenges in closing the breach detection gap, managing large dynamic sets of threat intelligence, and how to operationalize threat intelligence in a perimeter defense strategy. Additionally, we will demonstrate how leveraging threat intelligence in the security stack is providing large enterprises with real-time active network defense.
  • GitLab provides streamlined social coding and collaboration for Git development teams. But under the hood it's a powerful enterprise Git management platform. In this webinar we'll present best practices for managing permissions and users with LDAP and Active Directory, working with large binary files, code reviews and workflows, and clustering and replication. From security to performance and disaster recovery planning, this webinar will guide you to a rock-solid GitLab deployment.
  • Constantly evolving threats can be more difficult to counter—unless you have full visibility into potential vulnerabilities of your infrastructure. Built on the leading cloud security and compliance platform, Qualys gives you immediate, global visibility of IT vulnerabilities. Join this webcast to learn more.
  • Vous pouvez détecter et résoudre les vulnérabilités avant que les pirates ne passent à l’attaque !

    Contrer des menaces qui évoluent en permanence peut s’avérer une tâche ardue. Sauf si vous avez une visibilité totale sur les vulnérabilités potentielles pouvant sévir sur votre infrastructure. S’appuyant sur la première plate-forme de sécurité et de conformité dans le Cloud, Qualys vous offre une visibilité immédiate et globale des vulnérabilités IT. Assistez à ce Webcast pour en savoir plus.
  • Accurate, complete, secure — these are the hallmarks of enterprise data at world-class organizations. In healthcare, the importance of these metrics carries even more importance. That’s why CHRISTUS Health takes a systematic approach to managing its information assets. Operating in more than 60 U.S. cities and half a dozen states in Central and South America, CHRISTUS understands the challenges of building information systems that respect privacy, while enabling the kind of analysis that leads to better patient outcomes.

    During this Health Data Management webcast, learn how CHRISTUS Health assembled a comprehensive data strategy for delivering an advanced analytics infrastructure. You’ll hear how a combination of Data Management tools and Data Governance process addressed core challenges of working with multiple systems across the spectrum of healthcare domains. An in-depth Q&A session will let attendees learn about the best practices that enable operational and clinical efficiencies through this next-generation analytical solution.
  • ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
  • The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
  • Despite years of headlines, and countless examples, many organizations are still under the impression that DDoS attacks are a problem for somebody else (i.e. their ISP), or that it’s a problem that can be defended using an existing on-premise security solution, such as their firewall or IPS. In a risk obsessed world, these organizations are ignoring the very real likelihood of becoming a target for DDoS attacks, along with the severe operational and business consequences of falling victim to an attack.

    It’s time to debunk some misconceptions about DDoS.

    Attend this webinar to learn:

    - Why a single layer of DDoS protection isn’t enough
    - How the impact of a DDoS attack is significantly more costly than protection options
    - The correlation between DDoS attacks and advanced threats revealed in our latest research and how both are used during multiple phases of an advanced threat campaign.
  • Like many large universities, the University of New Brunswick (UNB) found itself increasingly targeted by a vast array of Internet threats. Originally designed to give large numbers of users broad access to data of all kinds, university IT systems like UNB’s are easy targets for cyber criminals.

    Join David Shipley from UNB for this live, interactive webinar, as he describes the ambitious process that he and his colleagues undertook to implement a proactive, intelligence-based cyber security strategy that gives them real-time visibility into attacks in progress, along with actionable insights to respond quickly and effectively.

    In less than an hour, David will tell you:
    • Why simply reinforcing perimeter defenses was not the right approach for UNB
    • How they were able to gain better security visibility and intelligence—and use it effectively
    • Which solutions combined to dramatically improve UNB’s cyber security without greatly increasing resource demands
    • And more…

    Don’t miss this opportunity to learn from an accomplished peer, and to discover how you too can create and implement an effective, intelligence-based security strategy for your organization.
  • Generally, risks associated with continuity planning, from physical to cyber-security, are part of an ever-evolving threat to our systems and technologies. Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. What are some of the risks associated with continuity planning? Why is managing risk important for continuity? What are some of the methods used to mitigate risks in continuity planning?

    The COOP presentation will provide an understanding of Continuity and Continuity of Operations, explain the importance of a viable Continuity capability, and emphasize the need for a viable Continuity capability in all organizations, to demonstrate some of the linkages between continuity programs and:

    • Risk Management
    • Physical Security
    • Emergency Management
    • Cyber Security/ Information Technology

    Join us on April 21 as NCP’s senior continuity practitioner shares resilient continuity programs and outreach efforts. Hear from Eric Kretz, NCP, as he talks about Information Integration: Leveraging Risk, Physical and Cyber Security and Continuity Planning.
  • Jayme Williams, Senior Systems Engineer at TenCate is protecting eight environments across the US and Canada – and each site has different storage. All sites require disaster recovery and backup across the application set. Having one solution would be ideal, but not possible – until they came across Zerto.
    Zerto Virtual Replication is storage agnostic and made it easy to integrate a new site into their disaster recovery plan. Their original business continuity and disaster recovery (BC/DR) plan, affectionately named the “Hit by the bus” book due to its volume, has been greatly simplified and the service levels they are seeing are outstanding – single digit seconds for their recovery point objectives (RPO).

    Finally, they are incorporating public cloud into their IT plans by backing up their applications from their DR site to AWS. With one solution, they can achieve their BC/DR and backup SLA, while reducing costs and introducing public cloud into their IT strategy at a pace that supports changing business requirements.

    With Zerto Virtual Replication:
    •Manage all sites in one pane of glass with one tool for replication and automation of failover, failback and testing processes as well as backup
    •Increase efficiencies with the ability to track and manage consumption across the hybrid cloud
    •Hardware agnostic solution does not require a change in the infrastructure reducing costs
    •Consistency in the BC/DR solution dramatically reduces operational costs
    •Replicates between different types of storage and versions of VMware vSphere making it easy to add new sites to the process
    •Point-in-time recovery enables failover to a previous point to recover from any issue – logical corruption, datacenter outage, etc.
    •Leveraging a public cloud strategy with backups stored in Amazon
  • It is no secret that we live in a 24/7 world that demands information be always available, always accurate and always secure. In order to meet these demands a comprehensive risk management program must be in place. At the forefront of these efforts are the preventive measures that try to reduce the probability of a disruptive incident occurring. But as has been all too often the case, these protective actions may not be enough. Whether it be the force of nature, the actions of terrorists, the fragility of infrastructures or so many other disruptive events will and do happen.

    Left with the reality that we must prepare for interruptions to occur, the job of the Business Continuity Professional is to minimize the resulting impacts. Creating environments that will provide connectivity, processing and data integrating, more and more organizations are looking toward the clouds. Whether it be to ensure that data can be shared or looking for full automated recovery cloud computing has a possible answer. This presentation will discuss what the cloud is, how it can make organizations more resilient and some of the issues pertaining to its usage.
  • Changing IT needs and complex infrastructures require flexible and dynamic solutions to help you transition your environment. The release of Symantec™ Backup Exec 15 is the perfect time for you to review your backup and recovery infrastructure to meet these changing demands. Whether you are an existing Backup Exec customer or not, now is the time to upgrade to a reliable choice; the leading-edge offering for virtual, physical and cloud platforms.

    Join us to understand how Backup Exec 15 provides the flexibility to protect confidently whatever your platform, technology or application need. Delivering the power to protect your information faster, restore what you need when you need it and the ease the time and burden of “doing backup.
  • Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.

    Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.

    Join this webinar to learn about

    - Advances in Wi-Fi security
    - Multi-layers approach to holistic protection
    - Controlling user and device access
    - Controlling applications
    -Xirrus security solutions
  • Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
  • Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • Organizações de todos os setores estão investindo em Governança de dados para obter valor de seus dados e cumprir com as regulamentações da indústria: reduzir custos, aumentar as vendas e aumentar as margens de lucro.
  • As a required OSHA surveillance program, Hearing Conversation is one of the most frequently implemented medical surveillance programs. Join the Axion Health clinical content group for a comprehensive review of Hearing Conversation requirements and program methodologies.
  • Companies operating data center in areas prone to earthquakes need to take a systematic approach to quantifying and mitigating their risk. For several years, Molly managed disaster recovery planning for a large Southern California utility. During her tenure, she commissioned two "seismic audits" of three data centers located in the region. Through these studies, she was able to inform management about the level and probability of the risk of losing the use of all three locations following an earthquake. This presentation will describe the techniques used and the benefits the study brought.
  • As Git gains in popularity and Subversion extends its features for enterprise development, the two often operate side-by-side. This session will outline the benefits of each system (centralized vs. distributed), and how to best support a hybrid deployment.
  • Toutes les entreprises sont d’accord pour dire qu’avoir une bonne infrastructure de sauvegarde est essentiel. En réalité, la plupart de ces infrastructures ont du mal à évoluer et à s’adapter à des environnements de plus en plus difficiles à gérer et complexifiés par les architectures virtualisées et le cloud hybride.
    Ne rien faire est impossible !
    Découvrez comment exploiter la puissance de vos informations avec les solutions de sauvegarde et de restauration Symantec :
    -en rendant votre entreprise conforme aux futures demandes de la réglementation Européenne sur la Protection des Données ;
    -en standardisant votre information au sein d’une plateforme de sauvegarde unique, pour casser les silos ;
    -en s’adaptant à la taille de votre environnement, avec une performance prédictible ;
    -en offrant à vos utilisateurs des possibilités de self-service ;
    -en modernisant votre infrastructure grâce aux appliances.
  • Please join us for a live Q&A session on Monday April 27th at 3:30pm AEST / 5:30pm NZST, with Steve Durbin, Managing Director of the Information Security Forum, on the ISF's Threat Horizon 2017 Report.

    Threat Horizon Report, released last month, is a detailed examination of potential current and future security threats facing organisations.

    Meticulously researched by the ISF, the report:
    •covers nine threats poised to overwhelm defences
    •identifies potentially significant business impacts
    •proposes actions that organisations can take to safeguard their reputation and wider business value

    Before the Q&A:

    •Read about the Threat Horizon Report in CIO Magazine: (http://www.cio.com/article/2898037/security0/9-biggest-information-security-threats-for-the-next-two-years.html#slide1)

    •Or view the BrightTalk Webinar: https://www.brighttalk.com/webcast/9923/140635

    •If you'd like, please send any questions you want to ask to Vicky Taylor, by Thursday April 23rd (vtaylor@shelde.com)

    Q&A Details:

    During the Q&A Session Steve will take any questions you have on the report and its findings.

    Date: Monday April 27th

    Time: 3:30pm to 4:15pm AEST / 5:30 - 6:15pm NZST
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

    Join us for a session that will cover:
    • An overview of the current attack landscape and implications
    • Best practice defense against modern DDoS attacks
    • Lessons learned by global enterprises struck by attacks
  • Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing
  • As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Set aside 30 minutes on Wednesday, April 29th as we explain in more detail how your data is vulnerable as it moves across data networks. During our session, "Surveillance: You ARE being watched" we’ll uncover security issues and risks, as well as new features and affordable solutions.
  • In this webinar you will learn more about the AddressDoctor spring release 5.7.0:

    •Improved Coverage of Business Names and Addresses in the United Kingdom
    •Building-Level Rooftop Geocoding for United Kingdom
    •Ability to Retrieve UPRN as Enrichment for United Kingdom Addresses
    •Ability to Retrieve Province ISO Codes in Batch, Interactive, and Fast Completion Results
    •Multi-Language support for localities in Switzerland
    •Ability to Retrieve NIS Code as Enrichment for Belgium Addresses
    •New point geocoding feature for Australia
    •Ability to Remove Locality and Province Descriptors from China and Japan Addresses
    •Improved Parsing and Validation of India Addresses
    •Ability to Retrieve FIAS ID as Enrichment for Russia Addresses
    •Introduction of Cyrillic Script for Bulgaria Addresses
    •Ability to Validate Slovakia Addresses that Contain Street Name Abbreviations