RSS feed Get our RSS feed

News by Topic

risk management

Results 326 - 350 of 692Sort Results By: Published Date | Title | Company Name
By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : aternity, grc, risk management, compliance, end user experience, customer data
     Aternity
By: HP     Published Date: Aug 08, 2014
Looking beyond storage, HP Converged Infrastructure solutions enable your business to unleash the potential of your data center and reduce risk. Overcome IT sprawl with simplified management and implementation, enhanced performance, improved availability, and the economies of open standards and connectivity. For the business, this means faster time to revenue, increased agility, lesser risk, and lower cost of operation. HP delivers better value of convergence than other vendors do.
Tags : backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance
     HP
By: HP     Published Date: Jul 08, 2009
The growth of structured data from databases, e-mail and other applications has been exponential. The increasing flood of data can lead to a host of problems — failing to recognize that data storage must be managed as a critical resource often results in a very difficult environment to manage, a higher cost of ownership, less responsiveness to change and added risk to the business. This white paper discusses how a dedicated, optimized network storage solution can increase data availability and reduce operating costs by simplifying management and improving capacity utilization.
Tags : simply storage, storage, email, databases, databasing, structured data, network storage solution, capacity utilization
     HP
By: IBM     Published Date: Jun 25, 2013
This new edition has a wider scope than the previous one, with 17 participants while retaining a similar maturity model as the previous one in order to help participants measure their progress year -on-year.
Tags : hpc, maturity, risk management, maturity model
     IBM
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
     CA Technologies
By: VMware     Published Date: Jun 21, 2019
Prime your business for growth with a software-defined approach. The current business-enterprise climate demands robust connectivity and delivery in services. As IT executives continue to invest in integrated infrastructure, companies that remain committed to hardware-centric infrastructure are being left behind and subsequently are exposing their enterprises to risk and loss. Liabilities include time wastage and financial costs in the management and maintenance of legacy infrastructure, creating a deficit in executives’ energy when it comes to innovation and future planning. VMware’s Hyperconverged Infrastructure (HCI) is a malleable, sophisticated solution which facilitates the vital transition from physical to virtualized storage solutions. HCI is the foundation for the Software-Defined Data Center (SDDC) destined for leading enterprise operations.
Tags : 
     VMware
By: IBM     Published Date: Jul 22, 2015
By using FTM, financial institutions can gain visibility into message processing, balance financial risk and facilitate effective performance management.
Tags : financial transaction manager, ftm, financial risk management, business applications, enterprise, data management solutions, storage management
     IBM
By: IBM     Published Date: Sep 27, 2013
The challenges faced by midsize businesses remain daunting. An uncertain economic outlook, slow market growth and cost pressures continue to affect most industries. Yet, in most geographies, IT spending by midsize businesses is increasing. This report deals with this cost/benefit equation. Specifically, it compares the IBM i 7.1 operating system deployed on Power Systems with two alternatives: use of Microsoft Windows Server 2008 and SQL Server 2008, and use of x86 Linux with Oracle Database 11g, both deployed on Intel-based servers.
Tags : ibm, ibm i 7.1, power systems, it solutions, it costs, risk management, software solutions
     IBM
By: IBM     Published Date: Apr 22, 2014
Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.
Tags : ibm, it management, risk management, risk, risk management strategy, reputational risk, security
     IBM
By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : it security, malware, malware protection, virus prevention, ibm, threat intelligence
     IBM
By: IBM     Published Date: Dec 12, 2006
This white paper will outline the components of the Banking Data Warehouse (BDW) and how they assist financial institutions to address the data modeling and data consolidation issues relating to the Basel II Capital Accord. 
Tags : data warehousing, bdw, banking data warehousing, compliance, risk management, basel ii, ibm, security
     IBM
By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
     EMC
By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management
     Solidcore
By: Canon Business Process Services     Published Date: Aug 27, 2013
Discover how your business can institute an effective management strategy to reduce costs, increase productivity and manage document related risks by outsourcing your document process management function.
Tags : records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management
     Canon Business Process Services
By: IBM     Published Date: May 12, 2008
Challenges like competitive pressures, compliance activities and higher operational costs make service management more critical than ever. To keep up, IT operations must constantly improve visibility, control and automation while bridging the gaps among business, development and daily operations.
Tags : itil, service management, governance, risk management, ibm, ibm g&rm, ibm grm
     IBM
By: IBM     Published Date: Aug 22, 2014
Model both assets and liabilities in a single platform for greater accuracy.
Tags : risk management, risk analytics, alm modeling, financial modeler
     IBM
By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : ibm, security, predictive analytics, security policy, risk management, internet security, security solutions
     IBM Software
By: IBM     Published Date: Aug 07, 2012
As a claims management professional, you have to deal daily with formidable - and sometimes competing - challenges: provide superior customer experience; achieve operational excellence and cost containment; and effectively manage risk. Predictive analytics can help you improve each of these three outcomes, but more importantly, it helps strike the right balance among these three objectives for each new claim received. Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : improving, claims, management, outcomes, predictive, analytics, claims, management
     IBM
By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : ibm, analytics, ecm, digital business
     IBM
By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : reputational risk, business continuity, risk management, cloud, social media, mobile, byod
     IBM
By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
     Wisegate
By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : risk management, reputational management, enterprise, threat prevention
     IBM
By: TIBCO Software     Published Date: Jul 22, 2019
Faster answers from unstructured data, improved accuracy of liability estimates, expanded service offerings
Tags : 
     TIBCO Software
By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention
     Skillsoft
By: Intralinks     Published Date: Apr 13, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: • Risk management – avoiding data breaches and loss of information that can result in non-compliance • Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device • IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols
Tags : 
     Intralinks
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics