article thumbnail

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Perficient

If you are joining us for the first time, I encourage you to check out the first blog for a quick rundown of our scenario. In the first blog, we outlined a scenario where our user Megan B. PII: Social Security Numbers) or custom expressions. End-user experience. Attempting to Print: User Experience.

How To 520
article thumbnail

Four Microsoft 365 Network Connectivity Principles You Need to Know (Part 3 of 4)

Perficient

Welcome back to part 3 of the “Four Microsoft 365 network connectivity principles you need to know” blog series! In addition to the local egress that we discussed in the last blog, this principle calls for direct connectivity specifically for Microsoft 365 connections. More on that in the next blog!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Four Microsoft 365 Network Connectivity Principles You Need to Know (Part 4 of 4)

Perficient

Welcome back to the last part of our “Four Microsoft 365 network connectivity principles you need to know” blog series! If you haven’t had a chance to check that blog post out yet, I encourage you to check it out here. Principle #4: Modernize Security for SaaS.

article thumbnail

Mastercard On Why It Supports EMV Secure Remote Commerce Specification

PYMNTS

Mastercard, the digital payments company, made the case in a blog post Monday (Oct. 22) on why it supports EMVCo’s release of the EMV Secure Remote Commerce Specification draft , which is now available for public review and comment. The finalized version 1.0 “The future that we all envision is right in front of us. .

Security 136
article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS). Controlling End-Users using Sensitive Data on Unmanaged Devices. Let’s say we have a user, Megan B. End-user experience.

Data 520
article thumbnail

Addressing the Need for Personalization in the Financial Services Industry

Perficient

Fueled by consumers’ willingness to share their data in return for timely and relevant experiences, personalization requires continually learning about the customer and applying this knowledge into the relationship and creating authentic, individualized experiences. What does your brand portray to the market?

Industry 294
article thumbnail

The Essential Software Development Toolkit for Your Payments Program

SWBC's LenderHub

You can think of SDK technology as an essential toolkit for developing secure software that enhances the user experience for your banking customers. In this blog post, I’d like to explore the advantages and benefits of using an SDK to develop software for your institution’s payments program.