RSS feed Get our RSS feed

News by Topic

risk management

Results 326 - 350 of 682Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
     Mimecast
By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models
     Trillium Software
By: Mainline Information Systems     Published Date: Oct 20, 2009
Get the critical information you need to transform your data center by implementing a solution based on the greatest possible computing power with the lowest possible energy expenditure.
Tags : energy efficiency, mainline information systems, infrastructure, risk management, thermal performance, environment improvements
     Mainline Information Systems
By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : navisite, technology, cloud comptuing, security, risk management, security management, business security
     Navisite- A Time Warner Cable Company
By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
     IBM
By: IBM     Published Date: May 12, 2008
Challenges like competitive pressures, compliance activities and higher operational costs make service management more critical than ever. To keep up, IT operations must constantly improve visibility, control and automation while bridging the gaps among business, development and daily operations.
Tags : itil, service management, governance, risk management, ibm, ibm g&rm, ibm grm
     IBM
By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities
     IBM
By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security
     IBM
By: IBM     Published Date: Sep 10, 2009
With ever-increasing data growth worldwide, organizations must find smarter ways to store and manage their massive volumes of data. Learn how IBM® Tivoli® Storage Management software solutions help to maximize your current storage environment and reduce operational and capital costs while improving service and managing risks.
Tags : storage management, ibm, ibmtivoli, fastback, san, data growth, recovery management, reducing costs
     IBM
By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization
     IBM
By: IBM     Published Date: Oct 14, 2009
This paper shows how mid-sized companies can benefit by implementing a virtualization strategy. Unique, industry-leading capabilities from IBM, Intel and VMware are highlighted.
Tags : virtualization, unique, roi, it infrastructure, servers, business continuity, system management, risk management
     IBM
By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : data security, ibm, information security, data retention, service management, security management, risk management, tivoli
     IBM
By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Supply Chain Management 2010 and Beyond WP," you'll see how the role of the supply chain manager is shifting from tactical to strategic. And learn why successful supply chains must be strategic, dynamic and customer-driven.
Tags : supply chain, ibm, scm, customer driven, talent management, risk management, business process integration
     IBM
By: IBM     Published Date: Oct 28, 2009
In the IBM white paper, "The Smarter Supply Chain of the Future: Global Chief Officer Supply Chain Study," you'll see how sensor technologies, new analytic capabilities and simulation techniques can predict, if not prevent, disruptions before they occur.
Tags : supply chain management, ibm, risk, management systems, connectivity, scm, network
     IBM
By: IBM     Published Date: Dec 07, 2010
Energy and utility companies need to manage incidents such as customer complaints or disputes to improve customer service while protecting the business should escalations occur. Advanced case management (ACM) provides enhanced service and risk management throughout the lifecycle of a case.
Tags : ibm, advanced case management podcast, acm, energy and utilities industries, customer service, risk management, business intelligence, content and process management
     IBM
By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
     Stratus Technologies
By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : access control, rules, compliance, governance, risk management, rbac, iam, identity management
     Aveksa
By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : access control, access certification, compliant, certification, rules, compliance, governance, risk management
     Aveksa
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance
     Aveksa
By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : identity management, iam, access management, iam, risk management, identity theft, hackers, fraud
     IDology
By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions
     LockLizard
By: LANDesk     Published Date: Jan 12, 2009
The purpose of this paper is to present a method for reducing risk and increasing IT contribution during uncertain times and to assist readers with measuring the value and building a business case for IT Service Management (ITSM).
Tags : avocent, itsm, it service management, itil, it infrastructure library, green it, business management, maturity model
     LANDesk
By: LANDesk     Published Date: Aug 26, 2009
Service management solutions have the potential to return very significant hard-currency ROI. Successful implementations dramatically improve decision accuracy, enhance productivity, increase operating efficiency and reduce operational risk by providing comprehensive context for a wide range of management decisions.
Tags : avocent, itsm, it service management, itil, integration, sla, it infrastructure library, green it
     LANDesk
By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit
     Tripwire, Inc
By: PC Mall     Published Date: Mar 27, 2012
IBM Rational software solutions can help you evaluate an application portfolio with the goal of retiring, modernizing and consolidating what could amount to hundreds of application.
Tags : application, application portfolio, cut costs, fund, innovation, risk, evalutate, evaluation
     PC Mall
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics