EfficiencyRead more articles
Infographics – The benefits of going paperless for your board meetings
Today, solutions exist that can help throughout the life-cycle of these meetings. Ergonomic and intuitive, they facilitate upstream preparation by reducing email exchanges and the sending of paper documents. Furthermore, they also offer a secure way to exchange files and messages with no risk of them being intercepted by third parties, from writing the agenda to sharing the minutes of…
Virtual data room: the ideal solution for mergers and acquisitions
When it comes to mergers and acquisitions (M&A), companies often distribute, share, and consult a huge amount of information. Sometimes strictly confidential. And if the topic is somewhat sensitive, data security is a major issue. But not the only issue. So what solution is best suited to help you improve, speed up, and simplify the sharing of sensitive data? To…
InnovationRead more articles
Infographics – Secure web navigation
IT departments and users want to enjoy flexibility when browsing the web. But how can they guarantee the highest level of security at the same time? The answer could well be virtualization.
Blockchain: a secure, decentralized database that’s impossible to forge
Blockchain. The word is everywhere. You’ve probably been hearing the media talking about it for several years. But what is it actually about? Is it really a revolution, as French magazine Le Point puts it? Can this technology change the world, as The Economist claimed a few months ago? Let’s take a look at the phenomenon that’s raising a lot…
How can the cloud solve the problems your customers face every day?
Never lose any photos or videos from your smartphone again Photos, videos, contact lists, emails, schedules... our smartphones store extremely valuable data that we want to be able to access at any time and would never want to lose. According to a study, 91% of users believe it is essential to be able to access their photos instantly wherever…
NewsRead more articles
Brexit: the UK pushes for free flow of data with the EU
In June 2016, the British people voted in a referendum to leave the European Union, meaning the future of UK-EU relations is at play at this point in time. Three priorities have been set out for the negotiations: the financial settlement of the divorce, the rights of EU citizens living in the United Kingdom, and the border between Northern Ireland…
Global cyberattack: WannaCry ransomware strikes 200,000 computers around the world
A global attack. On an unprecedented scale. 200,000 victims. 150 countries hit. Paralyzing countless businesses and organizations. The WannaCry ransomware has been hitting headlines around the world since May 12, 2017. The cyberattack highlighted just how vulnerable IT systems are, and is a prime opportunity to remind ourselves of just how important it is to back up and protect our…
RegulationRead more articles
NIS Directive: a higher common level of network and IT system security within the EU
The different strategies in place at a European level are a good place to start when it comes to raising awareness of cybersecurity within the European Union. The Network and Information Security (NIS) Directive, adopted in July 2016, is a perfect example of this. Member States have until May 9, 2018, to transpose the legislation into their national law. “Cybersecurity…
Infographics- Insider lists management
On July 3rd 2016 the new EU Market Abuse Regulation (MAR) came into force. One of the important procedural changes outlined in MAR is for organizations to identify, record ans retain insider lists, that they need to produce upon request.
GDPR: what do European companies need to do to comply?
After more than 4 years of negotiations and hundreds of amendments, the General Data Protection Regulation (GDPR) was finally published in April 2016. The new legislation, which replaces a Directive from 1995, enters into force in May 2018. And if businesses want to avoid a fine which could be imposed if the new European rules are violated, now is the…
SecurityRead more articles
EU proposes new measures to protect against cyberattacks
The European Union is seeking to help Member States prevent and respond to cyberattacks more effectively. Its new package of sweeping cybersecurity measures is designed to equip Europe with the tools it needs. The Commission announced that it was working on a label for businesses and reforming ENISA, the current European Union Agency for Network and Information Security. “In the…
Private cloud: a tailor-made solution to guarantee your data confidentiality
93% of businesses today are using cloud computing services, opting for solutions that adapt to their everyday needs and requirements. Before migrating, these companies were faced with a choice between the public cloud or the private cloud – or even the hybrid cloud. But it’s important to know the differences between these three models. Here we focus on the private…