RSS feed Get our RSS feed

News by Topic

risk management

Results 351 - 375 of 680Sort Results By: Published Date | Title | Company Name
By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : ibm, threat detection, technology, security, security policy, risk management, vulnerability management
     IBM Software
By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : ibm, security, identity management, insurance fraud, data protection, risk management
     IBM Software
By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : ibm, security, predictive analytics, security policy, risk management, internet security, security solutions
     IBM Software
By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis
     IBM Software
By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing
     IBM Software
By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
     Lumension
By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
     Lumension
By: IBM Corp     Published Date: May 31, 2011
This paper explains virtualization, its benefits for mid-sized business and how IBM's virtualization strategy can help mid-sized companies reduce costs, improve services and simplify management.
Tags : ibm virtualization, mid-sized businesses, ibm solutions, virtualized infrastructure, system x, bladecenter hs22v, vmware, tco
     IBM Corp
By: IBM Software     Published Date: Jul 06, 2011
Learn why you should keep your software subscription up to date.
Tags : ibm, tivoli, software subscription and support, renewal, bill kribbs, laura sanders, risk compliance, search
     IBM Software
By: IBM     Published Date: Aug 07, 2012
As a claims management professional, you have to deal daily with formidable - and sometimes competing - challenges: provide superior customer experience; achieve operational excellence and cost containment; and effectively manage risk. Predictive analytics can help you improve each of these three outcomes, but more importantly, it helps strike the right balance among these three objectives for each new claim received. Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : improving, claims, management, outcomes, predictive, analytics, claims, management
     IBM
By: IBM     Published Date: Oct 01, 2012
his independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : virtualization, it infrastructure, software partitioning, reduce costs, risk management
     IBM
By: IBM     Published Date: Oct 01, 2012
The paper explains virtualization in the context of mid-sized businesses and shows how they can reduce costs, improve services and simplify management.
Tags : virtualization, dynamic infrastructure, ibm, risk management, system management
     IBM
By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction
     IBM
By: SAP     Published Date: Jul 17, 2012
High performers are quick to detect and respond to subtle changes in their markets, absorb external pressures without undue disruption, and consistently achieve superior results. among these leading organizations is an increasing recognition of the value of using unified enterprise performance management solutions to measure, manage, and monitor their financial and nonfinancial performance.
Tags : sap, business, managing, finances, performance, performance management
     SAP
By: CDW     Published Date: Jun 30, 2015
See why CDW has the expertise to design and deliver the best enterprise mobility management (EMM) solution for how your business handles the mobile device hoopla.
Tags : mobility, apps, strategy, platform, emm, risk management, productivity
     CDW
By: CDW     Published Date: Aug 07, 2015
How you benefit from VMware vSphere with Operations Management
Tags : data center, storage, cloud, risk management
     CDW
By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection
     Kaseya
By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra
     NAVEX Global
By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
     NAVEX Global
By: NAVEX Global     Published Date: Mar 04, 2014
Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.
Tags : navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
     NAVEX Global
By: RingCentral     Published Date: May 22, 2014
As a purchasing executive or vendor management professional, your goal is to balance business value, cost and associated risks when sourcing and managing technology vendors. Download this whitepaper and learn: • To identify internal drivers that shape sourcing strategies • Best practices for developing a new T&M sourcing strategy • 5 key sourcing and vendor management activities that strengthen your sourcing strategy
Tags : ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
     RingCentral
By: Enterprise Mobile     Published Date: Dec 08, 2014
Download this solution brief and learn how to address management challenges while reaping the rewards that mobility has to offer.
Tags : enterprise mobile, mobility management, management strategy, risk management, mobility, enterprise applications, application risk management, enterprise mobility management
     Enterprise Mobile
By: Tyco Integrated Security     Published Date: Mar 09, 2016
Since 1874, Tyco Integrated Security has consistently provided quality products and services to our customers. From loss prevention to operational and risk management, our ultimate goal is to help you better protect your business and meet your security needs.
Tags : tyco, security, commercial, loss prevention
     Tyco Integrated Security
By: Cornerstone OnDemand     Published Date: Feb 22, 2016
Tracking employee performance reviews and training with spreadsheets is time consuming, error-prone, and can even be a compliance risk. Not only does making the smart switch to a talent system eliminate the time wasted on paper-based people management, but organisations with an integrated talent approach have 40% lower turnover in high performers. But don't just take our word for it – download 8 reasons to stop managing your people with spreadsheets and find out why organisations just like yours have made the switch from paper to performance
Tags : spreadsheets. compliance, risk, performance, tracking, turnover
     Cornerstone OnDemand
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics