RSS feed Get our RSS feed

News by Topic

risk data

Results 451 - 475 of 553Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Nov 19, 2014
Algorithmics: Back to the future - Revisiting capital and the bank of tomorrow
Tags : ibm, risk management, capital management, cash management, data availability, future banking
     IBM
By: Dun & Bradstreet     Published Date: Mar 03, 2017
Navigating Uncertainty & Disruption in a Post-Brexit World Risk management and finance professionals are navigating an unprecedented period of uncertainty. In a post-Brexit world, how can business leaders best navigate disruption? Data has become the most valuable business commodity, but not all data is meaningful. Data that helps you uncover hidden associations with customers, partners and suppliers can be a true catalyst for business transformation and growth. In this ebook, we have mapped out the crucial steps in the journey towards operationalizing relationship data to: - Define Relationship Data - Use relationship data to unlock new opportunities - Apply relationship data across the organization to drive growth
Tags : 
     Dun & Bradstreet
By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
     Kronos
By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
     RMS
By: Vision Solutions     Published Date: Dec 31, 2007
Downtime and data loss pose intolerable risks to every business today. From IT departments to the Board Room, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability.
Tags : aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup
     Vision Solutions
By: Teradata     Published Date: Jun 12, 2013
The ever-changing environment has offered fraudsters some tactical advantages to probe for holes in the defenses of financial services companies. Conventional approaches to fraud detection and remediation remain effective to a point, but conventional tools cannot effectively and economically process what is known as big data.
Tags : enterprise risk intelligence, fraud detection, big data, fraud prevention
     Teradata
By: Fiserv     Published Date: Mar 02, 2018
Don’t Let Non-Compliance Fines Impact your Bottom Line and Reputation. Manual reconciliation of vast amounts of data is an arduous process, involving countless staff hours that includes backtracking, often ending without an audit trail to demonstrate how the balance sheet was derived. Automated processes offer a solution to this risk-laden adventure. In the white paper, The Buried Costs and Hidden Risks of Manual Reconciliation for Financial Institutions, learn how to calculate and compare the costs of a manual system versus an automated system. Tags: manual reconciliation, automated reconciliation for banks, automated reconciliation for credit unions, automated reconciliation, automated reconciliation for financial institutions, automated reconciliation system, non-compliance, data reconciliation
Tags : manual reconciliation, automated reconciliation for banks, automated reconciliation, automated reconciliation system, non-compliance, data reconciliation
     Fiserv
By: McAfee     Published Date: Jan 23, 2013
John Oltsik from ESG discusses the next generation of data-centric DLP that addresses today's risks and keep your business data safe.
Tags : dlp, data-centric dlp, data leakage, dlp deployment
     McAfee
By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
     Iovation
By: CA Technologies     Published Date: Sep 25, 2017
This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : integration, developers, open enterprise, api, business, ca technologies
     CA Technologies
By: CA Technologies     Published Date: Aug 22, 2017
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
     CA Technologies
By: CA Technologies EMEA     Published Date: May 23, 2018
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data. This transformation is also amplifying competition. As analyst Mark Raskino notes, “As a consequence, all players rebuilt their strategies around the same time, and all have awakened to the power of digital business at the same time. Contention is therefore inevitable.” To find out more download this whitepaper today!
Tags : 
     CA Technologies EMEA
By: Dell & Microsoft     Published Date: Jul 10, 2013
This guide will examine major business risks associated with traditional data protection approaches, particularly with regard to their applicability for a hybrid, virtual + physical data center. It will redefine the business goals and drivers for data protection, and consider alternative approaches that better meet those goals.
Tags : data protection, virtual data center, physical data center, hybrid
     Dell & Microsoft
By: Druva -AWS     Published Date: Apr 28, 2018
Data Loss Protection for Your SaaS & Cloud Apps SaaS applications like Office 365, G Suite, Box and Salesforce are not necessarily built to deliver a complete solution for data protection. This guide reveals the unforeseen risks of trusting your SaaS application to protect your data.
Tags : 
     Druva -AWS
By: Talend     Published Date: Nov 02, 2018
Ready to embrace the multi-cloud future? This new TDWI Checklist Report is the cloud primer you’ve been waiting for. The most successful companies are embracing cloud data integration to help them leverage more data. Businesses are increasingly having to learn what data integration is and does as well as increasing their data processing scale and performance at lower cost. This whitepaper demonstrates how to reduce risk and disruption while implementing multi-cloud data integration and self-service data access.
Tags : 
     Talend
By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
     IBM
By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : criminal, justice, information, services, cjis, compliance
     MobileIron
By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
     Mimecast
By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : cloud, aws, security, organizations, visibility, control, networks, platforms
     Amazon Web Services
By: Talend     Published Date: Nov 02, 2018
Siloed data sources, duplicate entries, data breach risk—how can you scale data quality for ingestion and transformation at big data volumes? Data and analytics capabilities are firmly at the top of CEOs’ investment priorities. Whether you need to make the case for data quality to your c-level or you are responsible for implementing it, the Definitive Guide to Data Quality can help. Download the Definitive Guide to learn how to: Stop bad data before it enters your system Create systems and workflow to manage clean data ingestion and transformation at scale Make the case for the right data quality tools for business insight
Tags : 
     Talend
By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
     Dome9
By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : ibm, ibm bigfix, risk management, data security, security
     IBM
By: Splunk     Published Date: Aug 21, 2018
While the modern enterprise embraces digital technology, it is also at risk of cyberattacks. In this guide, “The Essential Guide to Security”, we map out how organizations can use machine data for specific use cases and get started addressing threats and security challenges. Download your complimentary copy to learn: *How to assess your organization’s security maturity *What specific threats you should be looking for and how to fight them *What data sources are needed for specific use cases *What software solution you need to get ahead of different threats
Tags : 
     Splunk
By: Telx     Published Date: Dec 09, 2014
CIOs are on a constant quest to understand what infrastructure will provide the best fit, at the lowest risk and cost. In today’s evolving data center, defining the proper use of data center assets, and how cloud-based platforms may or may not fit into the mix is critical to business success. With the abundance of cloud offerings in the market place, physical infrastructure is no longer an enterprise IT requirement. Cloud has established itself as an excellent option for infrastructure outsourcing.
Tags : telx, data center, network architecture, infrastructure, storage, data center costs, power and cooling, energy
     Telx
By: F5 Networks Inc     Published Date: Dec 08, 2017
In today’s digital marketplace, your applications are your business. They fuel innovation and are the driving force for staying competitive in an always-on, always-connected world. Apps are the way you build relationships with your customers, empower your employees, facilitate growth, and so much more.
Tags : cloud risk, application safety, corporate data risk
     F5 Networks Inc
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics