RSS feed Get our RSS feed

News by Topic

risk management

Results 301 - 325 of 643Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization
     IBM
By: IBM     Published Date: Oct 14, 2009
This paper shows how mid-sized companies can benefit by implementing a virtualization strategy. Unique, industry-leading capabilities from IBM, Intel and VMware are highlighted.
Tags : virtualization, unique, roi, it infrastructure, servers, business continuity, system management, risk management
     IBM
By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : data security, ibm, information security, data retention, service management, security management, risk management, tivoli
     IBM
By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Supply Chain Management 2010 and Beyond WP," you'll see how the role of the supply chain manager is shifting from tactical to strategic. And learn why successful supply chains must be strategic, dynamic and customer-driven.
Tags : supply chain, ibm, scm, customer driven, talent management, risk management, business process integration
     IBM
By: IBM     Published Date: Oct 28, 2009
In the IBM white paper, "The Smarter Supply Chain of the Future: Global Chief Officer Supply Chain Study," you'll see how sensor technologies, new analytic capabilities and simulation techniques can predict, if not prevent, disruptions before they occur.
Tags : supply chain management, ibm, risk, management systems, connectivity, scm, network
     IBM
By: IBM     Published Date: Dec 07, 2010
Energy and utility companies need to manage incidents such as customer complaints or disputes to improve customer service while protecting the business should escalations occur. Advanced case management (ACM) provides enhanced service and risk management throughout the lifecycle of a case.
Tags : ibm, advanced case management podcast, acm, energy and utilities industries, customer service, risk management, business intelligence, content and process management
     IBM
By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
     Stratus Technologies
By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : access control, rules, compliance, governance, risk management, rbac, iam, identity management
     Aveksa
By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : access control, access certification, compliant, certification, rules, compliance, governance, risk management
     Aveksa
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance
     Aveksa
By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : identity management, iam, access management, iam, risk management, identity theft, hackers, fraud
     IDology
By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions
     LockLizard
By: LANDesk     Published Date: Jan 12, 2009
The purpose of this paper is to present a method for reducing risk and increasing IT contribution during uncertain times and to assist readers with measuring the value and building a business case for IT Service Management (ITSM).
Tags : avocent, itsm, it service management, itil, it infrastructure library, green it, business management, maturity model
     LANDesk
By: LANDesk     Published Date: Aug 26, 2009
Service management solutions have the potential to return very significant hard-currency ROI. Successful implementations dramatically improve decision accuracy, enhance productivity, increase operating efficiency and reduce operational risk by providing comprehensive context for a wide range of management decisions.
Tags : avocent, itsm, it service management, itil, integration, sla, it infrastructure library, green it
     LANDesk
By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit
     Tripwire, Inc
By: PC Mall     Published Date: Mar 27, 2012
IBM Rational software solutions can help you evaluate an application portfolio with the goal of retiring, modernizing and consolidating what could amount to hundreds of application.
Tags : application, application portfolio, cut costs, fund, innovation, risk, evalutate, evaluation
     PC Mall
By: IBM Software     Published Date: Nov 04, 2010
Learning from the past is one thing, but when real competitive advantage happens you get it right the first time.
Tags : ibm cognos, predictive analytics, enterprise data, risk management
     IBM Software
By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
     IBM Software
By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : ibm, threat detection, technology, security, security policy, risk management, vulnerability management
     IBM Software
By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : ibm, security, identity management, insurance fraud, data protection, risk management
     IBM Software
By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : ibm, security, predictive analytics, security policy, risk management, internet security, security solutions
     IBM Software
By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis
     IBM Software
By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing
     IBM Software
By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
     Lumension
By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics