RSS feed Get our RSS feed

News by Topic

risk data

Results 226 - 250 of 515Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
     IBM
By: IBM     Published Date: Oct 30, 2013
Learn how leading companies are using performance management analytics to unlock business value.
Tags : ibm, disclosure management, financial disclosure, risk management, complex reporting, global statutory reporting, financial data, operational data
     IBM
By: IBM     Published Date: Oct 30, 2013
Learn how you can extend the narrative reporting capabilities of your entire organization--while maintaining auditability and control.
Tags : ibm, cognos disclosure management, business intelligence, data collection, aggregation, data repository, executive management, decrease risks
     IBM
By: IBM     Published Date: Oct 30, 2013
Watch this short demo of IBM's disclosure management solution - Cognos Disclosure Management (CDM). Efficiently & accurately manage any high-value internal and external documents.
Tags : ibm, collaborative reporting, production management, cdm, cognos disclosure management, effeciently manage internal documents, efficiently manage external documents, accurately manage internal documents
     IBM
By: IBM     Published Date: Feb 27, 2014
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.
Tags : ibm, ibm software, innovation, software development, smart products, product delivery, smart software, consumerization
     IBM
By: IBM     Published Date: Mar 04, 2014
This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.
Tags : ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise
     IBM
By: IBM     Published Date: May 27, 2014
“Big data”– which admittedly means many things to many people – is no longer confined to the realm of technology. Today, it is a business imperative. In addition to providing solutions to insurance companies’ long-standing business challenges, big data inspires new ways to transform processes, organizations and many aspects of the insurance industry as we know it.
Tags : ibm, big data, insurance, insurance technology, big data solutions, business value, financial data, risk data
     IBM
By: IBM     Published Date: May 27, 2014
Big data and analytics help insurance companies identify the next best action for customers. With the right solutions, companies can extract, integrate and analyze a large volume and variety of data, from call-center notes and voice recordings to web chats, telematics and social media
Tags : ibm, big data, analytics, insurance, insurance industry, big data solutions, integration, risk assessment
     IBM
By: IBM     Published Date: Jun 17, 2014
Key findings from an industry roundtable on enterprise risk transformation in Canadian banking.
Tags : ibm, risk enabled enterprise, enterprise risk management, erm, big data, data aggregation, corporate governance, business analytics
     IBM
By: IBM     Published Date: Jul 09, 2014
Most organizations are managing data sets that are larger than ever before, where many security offenses can be hidden and undetected, posing severe risks to business operations and the protection of sensitive, private information. Watch this video and learn how these exposures can be addressed with IBM's integrated Security Intelligence and Big Data solution.
Tags : ibm, security, cyber security, security intelligence, big data, visibility, threat detection
     IBM
By: IBM     Published Date: Aug 05, 2014
IBM® InfoSphere® Master Data Management (MDM) helps organizations gain a comprehensive and accurate 360-degree view of their customers. This 360-degree view, when integrated with a CRM solution such as Salesforce.com, helps organizations improve the effectiveness of their CRM initiatives to help companies: -Increase user productivity -Improve sales and marketing performance to increase win rate and revenue -Mitigate risks associated with poor customer data Download here to learn more!
Tags : ibm, salesforce, mdm, crm, initiatives, data
     IBM
By: IBM     Published Date: Sep 16, 2014
To compete in today’s rapidly changing business environment, organizations need to capture, analyze and act on information rapidly. If they can quickly identify trends, discover patterns and generate new insights, they can address a wide array of strategic and operational goals—from increasing customer loyalty and creating targeted marketing offers to enhancing operational efficiency and reducing risk. In their report, Business Value of Big Data on Power Systems, NC State University talks about unlocking the business value of big data, and how IBM Power Systems can deliver the foundation for organizations to bring insight to the point of impact faster.
Tags : big data, targeted marketing offers, ibm power systems, structured data
     IBM
By: IBM     Published Date: Nov 19, 2014
As the use of mobile devices exponentially expands, so too does security threats to the increasing number of mobile applications that companies rely on. As a result, companies struggle to keep pace with mobile application security and face the risk of embarrassing and costly data breaches. In this technical session, you’ll learn how Worklight Application Scanning helps you deliver applications that aren’t susceptible to the most common types of malware, including SQL Injection and Cross-Site Scripting. In addition, you’ll learn how this powerful tool helps address the OWASP Top 10 Mobile Risks for 2014.
Tags : application screening, user feedback, mobile app development, cloud-based services
     IBM
By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC: Operational risk management in the world of big data - Unlocking the value of loss event data and driving the risk-aware enterprise
Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
     IBM
By: IBM     Published Date: Nov 19, 2014
Risk Management: General: Partially cloudy: the benefits of hybrid deployment models
Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
     IBM
By: IBM     Published Date: Nov 19, 2014
Algorithmics: Back to the future - Revisiting capital and the bank of tomorrow
Tags : ibm, risk management, capital management, cash management, data availability, future banking
     IBM
By: IBM     Published Date: Feb 11, 2015
This paper explores how companies can more safely introduce employee - or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value.
Tags : corporate data, business value, mobile devices, client services, security
     IBM
By: IBM     Published Date: Feb 24, 2015
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : big data, ibm, big data outcomes, information governance, big data analytics
     IBM
By: IBM     Published Date: Apr 06, 2015
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : big data, analytics, unstructured content, enterprise information, ibm, security, storage
     IBM
By: IBM     Published Date: Apr 06, 2015
With a data explosion upon us that shows no slowing in sight, information governance is no longer an option for corporations. IBM StoredIQ is an important first step toward getting data under control, lowering storage costs and mitigating risk.
Tags : information governance, ibm storediq, risk, storage, data management, security
     IBM
By: IBM     Published Date: Apr 09, 2015
Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.
Tags : magic quadrant, ibm, intrusion prevention systems, security, security risk, data security
     IBM
By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : ibm, risk management, security risk, security officer, data security, security
     IBM
By: IBM     Published Date: May 12, 2015
Creating more person-centric, coordinated and value-based care means all service providers must share risks and data, conducting business with partners that cross traditional boundaries, while data is transforming this industry at an unprecedented pace. Watch this webcast to learn more of how organizations are optimizing their business processes to lower costs, analyzing data to improve quality, care, and population health, while learning to engage in new ways to drive better outcomes.
Tags : risk, data, service provider, healthcare, optimization
     IBM
By: IBM     Published Date: May 12, 2015
The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.
Tags : ibm, healthcare, security, data, cybercrime
     IBM
By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
     IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics