RSS feed Get our RSS feed

News by Topic

risk management

Results 301 - 325 of 605Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 01, 2012
The paper explains virtualization in the context of mid-sized businesses and shows how they can reduce costs, improve services and simplify management.
Tags : virtualization, dynamic infrastructure, ibm, risk management, system management
     IBM
By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction
     IBM
By: SAP     Published Date: Jul 17, 2012
High performers are quick to detect and respond to subtle changes in their markets, absorb external pressures without undue disruption, and consistently achieve superior results. among these leading organizations is an increasing recognition of the value of using unified enterprise performance management solutions to measure, manage, and monitor their financial and nonfinancial performance.
Tags : sap, business, managing, finances, performance, performance management
     SAP
By: CDW     Published Date: Jun 30, 2015
See why CDW has the expertise to design and deliver the best enterprise mobility management (EMM) solution for how your business handles the mobile device hoopla.
Tags : mobility, apps, strategy, platform, emm, risk management, productivity
     CDW
By: CDW     Published Date: Aug 07, 2015
How you benefit from VMware vSphere with Operations Management
Tags : data center, storage, cloud, risk management
     CDW
By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection
     Kaseya
By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
     NAVEX Global
By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
     NAVEX Global
By: NAVEX Global     Published Date: Mar 04, 2014
Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.
Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
     NAVEX Global
By: RingCentral     Published Date: May 22, 2014
As a purchasing executive or vendor management professional, your goal is to balance business value, cost and associated risks when sourcing and managing technology vendors. Download this whitepaper and learn: • To identify internal drivers that shape sourcing strategies • Best practices for developing a new T&M sourcing strategy • 5 key sourcing and vendor management activities that strengthen your sourcing strategy
Tags : ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
     RingCentral
By: Enterprise Mobile     Published Date: Dec 08, 2014
Download this solution brief and learn how to address management challenges while reaping the rewards that mobility has to offer.
Tags : enterprise mobile, mobility management, management strategy, risk management, mobility, enterprise applications, application risk management, enterprise mobility management
     Enterprise Mobile
By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : tyco, security, commercial, loss prevention
     Tyco Integrated Security
By: Cornerstone OnDemand     Published Date: Feb 22, 2016
Tracking employee performance reviews and training with spreadsheets is time consuming, error-prone, and can even be a compliance risk. Not only does making the smart switch to a talent system eliminate the time wasted on paper-based people management, but organisations with an integrated talent approach have 40% lower turnover in high performers. But don't just take our word for it – download 8 reasons to stop managing your people with spreadsheets and find out why organisations just like yours have made the switch from paper to performance
Tags : spreadsheets. compliance, risk, performance, tracking, turnover
     Cornerstone OnDemand
By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : security
     BitSight Technologies
By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : cybersecurity, security risk, security ratings, security, it management, enterprise applications
     BitSight Technologies
By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector
     BitSight Technologies
By: BitSight Technologies     Published Date: May 26, 2016
Does your organization have sensitive data stored across the globe? Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
Tags : bitsight, data security, risk management, cybersecurity, vrm practices, risk management, security
     BitSight Technologies
By: BitSight Technologies     Published Date: May 26, 2016
With this guide, you’ll never have to wonder about that again. You’ll learn: - How to nail down your presentation goals and style. - How to select metrics your board will care about. - Things to keep in mind before and after a board presentation.
Tags : bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security
     BitSight Technologies
By: BitSight Technologies     Published Date: Jul 07, 2016
Download this white paper to learn: - Why vendor risk management is becoming a standard business practice - About the challenges organizations face in building formalized vendor risk programs - How to move beyond "point-in-time" tools and begin continuously monitoring your vendors.
Tags : bitsight, risk management, cybersecurity, vrm practices, vendor risk management, cybersecurity, security
     BitSight Technologies
By: Qlik     Published Date: Aug 31, 2016
Qlik apps are used by teams in head-office functions like group finance or risk. Here's a list of the top 12 solutions that are the most popular, and offer the greatest business value.
Tags : qlik, finance solutions, risk, insurance, claims management, cvs, sales performance
     Qlik
By: LogRhythm     Published Date: Feb 22, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
     LogRhythm
By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
     Rapid7
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
     Qualys
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics