article thumbnail

Securing Teams with built-in apps in Microsoft Endpoint Manager

Perficient

labor force working remotely, managing devices has become more important than ever. Luckily, Microsoft has made great advancements in device management capabilities, many of which we’ll discuss today. In this blog, we’ll go over four main areas of Endpoint Management: Creating an app deployment. Securing the App.

article thumbnail

U.S. Regulations to Consider When Managing a Cryptocurrency Fund

Perficient

However, in this blog, we will discuss the regulatory landscape surrounding cryptocurrency from an asset manager or fund manager perspective. We’ll then move to the federal level, seeking regulatory guidance as to whether digital tokens are securities under the jurisdiction of the U.S. Central Bank Digital Currency (CBDC) ).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don’t Miss Out! Join Us at Google Cloud Next ’20: OnAir

Perficient

Join us for a reimagined virtual experience that explores the full capabilities of cloud. Security – August 4. Security – August 4. Data Management & Databases – August 18. Join Cloud Study Jams for certification preparation, technical insights, and games. Weekly topics include: Industry Insights – July 14.

Google 515
article thumbnail

Silicon Valley Bank Failure – Lessons in Interest Rate Risk Management

South State Correspondent

While we will cover the general lessons HERE , in this article, we wanted to focus on the root cause – how and why interest rate risk caused the second-largest bank failure in US history (Washington Mutual was the largest in 2008). Equally important is the bank’s securities duration, as shown in the graph below.

article thumbnail

Security Risk Assessments – A Balance of Risk and Controls

Jack Henry

Risk – the possibility that something undesirable will occur – is always around us. As such, we have health insurance in case we get sick or injured, wear helmets on our bikes, wear seatbelts in our cars, and install alarm systems in our homes, all to reduce the risks around us.

Security 148
article thumbnail

Visitor Management Surges As Companies Look To Safely Reopen Post-COVID

PYMNTS

Add “lobby and visitor management” to the list of tech industries that have seen a spike in demand as companies contend with an ever-changing list of COVID-19-era requirements needed to safely and swiftly move people and packages in and out of their businesses. So what our customers are asking from us today as we reopen is, ‘Hold on a second.

article thumbnail

Five Simple Commands to Manage Your AWS EC2 Instances Using the CLI

Perficient

This post is going to focus on getting the data and managing the instance states. We’re an AWS Advanced Consulting Partner offering secure, easy-to-use, flexible, and scalable application hosting and architecture solutions to set you up for success. Contact us to learn more about how to get started with AWS.