RSS feed Get our RSS feed

News by Topic

risk solutions

Results 126 - 150 of 179Sort Results By: Published Date | Title | Company Name
By: Oracle Primavera     Published Date: Oct 09, 2015
As the oil and gas pipeline industry grapples with change at every level — including increasing pipeline operations and expanding regulatory oversight infrastructure —cost savings and operating efficiencies have become more important than ever. Both pipeline operators and contractors can benefit from utilizing EPPM solutions to help them pinpoint the best strategies to develop and implement projects from conception through execution to end game — thereby helping to reduce risk and manage cost. In the end, it’s all about smartly using an approach, such as EPPM solutions, like those from Oracle, to help pipeline operators and contractors reduce costs at the project, portfolio, and enterprise levels through the project lifecycle. The midstream companies that are able to implement the best approach to managing risk to their operations in the most cost - effective way will be the ones to best weather another tumultuous decade to come for the oil and gas industry.
Tags : oracle, oil and gas, oil and gas pipeline industry, cost savings, eppm solutions, midstream oil industry, project management, project portfolio management
     Oracle Primavera
By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : cloudendure, disaster recovery, best practices, disaster recovery survey
     CloudEndure
By: SAP     Published Date: Jan 27, 2009
This paper explains SAP’s vision for a cross-enterprise governance, risk and compliance (GRC) solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.
Tags : sap, governance, risk, compliance, cross-enterprise governance, sap solutions, grc solutions, enterprise-wide risk monitoring
     SAP
By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC Platform: Hypatia Research Group - The Convergence of Enterprise Governance, Risk & Compliance Software Solutions: Best Practices, Benchmarks & Vendor Galaxy Evaluations
Tags : ibm, enterprise governance, risk, compliance software, software solutions, hypatia research, grc, grc software
     IBM
By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC: Operational risk management in the world of big data - Unlocking the value of loss event data and driving the risk-aware enterprise
Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
     IBM
By: IBM     Published Date: Nov 19, 2014
Risk Management: General: Partially cloudy: the benefits of hybrid deployment models
Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
     IBM
By: IBM     Published Date: Feb 11, 2015
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : criminal fraud detection, authentication methods, ibm, criminal detection software, security
     IBM
By: IBM     Published Date: Jul 22, 2015
By using FTM, financial institutions can gain visibility into message processing, balance financial risk and facilitate effective performance management.
Tags : financial transaction manager, ftm, financial risk management, business applications, enterprise, data management solutions, storage management
     IBM
By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
     SAS
By: Schneider Electric     Published Date: May 09, 2016
IT virtualization, the engine behind cloud computing, can have significant consequences on the data center physical infrastructure (DCPI). Higher power densities that often result can challenge the cooling capabilities of an existing system. Reduced overall energy consumption that typically results from physical server consolidation may actually worsen the data center’s power usage effectiveness (PUE). Dynamic loads that vary in time and location may heighten the risk of downtime if rack-level power and cooling health are not understood and considered. Finally, the fault-tolerant nature of a highly virtualized environment could raise questions about the level of redundancy required in the physical infrastructure. These particular effects of virtualization are discussed and possible solutions or methods for dealing with them are offered.
Tags : schneider electric, edge computing, data center, energy efficiency, data center energy, optimized power, virtualization
     Schneider Electric
By: BlackBerry     Published Date: Mar 19, 2010
Today, many companies are investing in wireless and mobile solutions. Where mobility was once viewed as a risky venture, its value is now understood. These solutions are expected to increase productivity and improve efficiency due to improved field-based access to knowledge within the mobile workforce. In the current competitive climate where companies must compete globally, wireless solutions are no longer about gaining an edge, but about keeping up with the competition.
Tags : blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
     BlackBerry
By: IBM     Published Date: Mar 04, 2014
Customers’ expectations have never been so high. Yet, leaders at many banks and financial institutions still fail at providing a smooth, personalized, timely and relevant experience throughout channels. By leveraging the increasing amount of data about customers, bankers can create information to constantly improve their understanding of product usage, profitability, risk, buying behavior and financial needs. Access this white paper today to learn about expert solutions that can help you reinvent your business operations and create a customer-focused company. Read on now to explore more.
Tags : business operations, business process management, bpm, process automation, smarter process, banking, financial services, business process automation
     IBM
By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
     Webroot Inc
By: IBM     Published Date: Oct 10, 2013
The security world is a scary place, and it’s getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, it’s becoming more difficult to recruit and retain people who really get it and know how to help. It’s time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbers—and the feedback is overwhelmingly positive.
Tags : security, risks, threats, security breach, customer demands, regulations, forrester consulting, ibm
     IBM
By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
     IBM
By: IBM     Published Date: Nov 12, 2013
Customers’ expectations have never been so high. Yet, leaders at many banks and financial institutions still fail at providing a smooth, personalized, timely and relevant experience throughout channels. By leveraging the increasing amount of data about customers, bankers can create information to constantly improve their understanding of product usage, profitability, risk, buying behavior and financial needs. Access this white paper today to learn about expert solutions that can help you reinvent your business operations and create a customer-focused company. Read on now to explore more.
Tags : business operations, business process management, bpm, process automation, smarter process, banking, financial services
     IBM
By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : fraud detection, cybercrime, cyber threat, malware, security
     IBM
By: IBM     Published Date: Feb 11, 2015
An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.
Tags : application deployment, point security, ibm, ibm security solutions, security
     IBM
By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
     IBM
By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : ibm, it dependence, managing it risk, ibm solutions, security
     IBM
By: IBM     Published Date: Oct 06, 2015
How do you successfully transition business continuity to the cloud? Read the white paper to learn how an end-to-end, scalable solution can help you plan and execute an enterprise-wide continuity and resiliency strategy. As a result, you will be able to help improve risk management, reduce costs, facilitate resilient service delivery and respond to changes more quickly..
Tags : ibm, cloud, resiliency strategy, risk management, resilient service delivery, service delivery, service delivery solutions, security
     IBM
By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
     Cisco
By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
     IBM
By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : it security, malware, malware protection, virus prevention, ibm, threat intelligence
     IBM
By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: • Protect from reputational, regulatory and financial risks. • Reduce the cost of fraud and financial crimes prevention. • Gain a holistic view of risk across functions. • Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
     SAS
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics