RSS feed Get our RSS feed

News by Topic

risk solutions

Results 151 - 175 of 183Sort Results By: Published Date | Title | Company Name
By: NETIQ     Published Date: Mar 12, 2013
Sally Hudson, IDC research and analysis, sums up thoughtful Q&A session that highlights evaluating access governance solutions, developing agile processes and policies that meet security and compliance needs.
Tags : idc research, governance solutions, netiq
     NETIQ
By: Delphix     Published Date: Feb 28, 2013
Agile Data Management eliminates the common barriers to successful agile development, reducing both the cost and the risk of short, parallel development projects. This paper discusses common challenges and the technical solutions for addressing them.
Tags : database virtualization, roi, data management, data management software, agile development, application development
     Delphix
By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
     McAfee
By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : mobile security, solutions, websense, mobile security, solutions, major it security strategy, security
     Websense
By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper and learn about the risks of cloud computing, how you can control those risks and a few things to keep in mind when selecting a vendor for your cloud solutions.
Tags : cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
     NetIQ
By: ShoreTel     Published Date: Oct 26, 2012
Total cost of ownership is a key metric for assessing costs, benefits and risks of a UC solution, enabling organizations to properly evaluate competing solutions. This white paper examines the total cost of ownership measured in different ways.
Tags : shoretel, unified communications solutions, ucs, total cost of ownership, telecom, telecom solution, benchmarking
     ShoreTel
By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp
     CDW Symantec
By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction
     IBM
By: Palo Alto Networks     Published Date: May 09, 2012
In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
Tags : palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
     Palo Alto Networks
By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : ibm, security, predictive analytics, security policy, risk management, internet security, security solutions
     IBM Software
By: Brainloop     Published Date: Jan 04, 2012
How can IT provide a way for users to share documents without putting the company at risk? This white paper explores collaboration solutions using your current content management, ERP and security infrastructure, as well as a few new ones that might not be on your radar.
Tags : brainloop, technology, security, security solutions, infrastructure
     Brainloop
By: Sybase     Published Date: Dec 01, 2011
This free white paper shows you how leading financial services companies are reaping the benefits of Continuous Intelligence.
Tags : capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
     Sybase
By: Sybase     Published Date: Dec 01, 2011
This white paper shows the success of using a visual data analytics platform to monitor and manage positions/exposure in real time.
Tags : capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
     Sybase
By: Sybase     Published Date: Dec 01, 2011
This white paper looks at managing securities trading data based on a robust process and technology infrastructure.
Tags : capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
     Sybase
By: Sybase     Published Date: Dec 01, 2011
This free white paper explores how IT departments at financial institutions are assuming a more proactive role in identifying technologies.
Tags : capital markets, capital markets solutions, capital markets financial solutions, capital market solutions, capital markets software, capital market software, capital markets trading, market data collection
     Sybase
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection
     CA Technologies
By: Nasuni     Published Date: Apr 28, 2011
This white paper examines the key security risks inherent in cloud storage solutions, as well as the methods that can be used to mitigate those risks.
Tags : nasuni filer, security, cloud storage, openpgp
     Nasuni
By: SAP     Published Date: Mar 29, 2011
Consider issues as to why IT projects are at a risk to run late, over budget and not meet the goals. To address these concerns, software and service vendors are creating packaged solutions resulting in smaller, modularized implementations. Read how your company can benefit from packaged solutions.
Tags : packaged solutions, sap deployment solutions, saas
     SAP
By: GFI Software     Published Date: Feb 24, 2011
This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data.
Tags : gfi software, sunbelt, social networking, security risk, personal information, company data, data protection
     GFI Software
By: BlackBerry     Published Date: Mar 19, 2010
Today, many companies are investing in wireless and mobile solutions. Where mobility was once viewed as a risky venture, its value is now understood. These solutions are expected to increase productivity and improve efficiency due to improved field-based access to knowledge within the mobile workforce. In the current competitive climate where companies must compete globally, wireless solutions are no longer about gaining an edge, but about keeping up with the competition.
Tags : blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
     BlackBerry
By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : marathon, downtime, everrun, server, failure, outage, windows, sql
     Marathon Technologies
By: IBM     Published Date: Jul 23, 2009
Co-authors Moshe Cohen and Michael Lundblad examine the balance in managing business transformation and risk, look at reasons for software development's changing landscape and discuss solutions that can help your organization improve quality management to position you for innovation and growth.
Tags : ibm, ibm telelogic, roi, infrastructure, soa, alm, kpi
     IBM
By: IBM     Published Date: Jun 16, 2009
Tough times require tough actions. Business as usual is not enough. In today's economic environment, you are asked to do more with less -- at lower risk. During this Webinar, you will hear from two IBM WebSphere Portal customers about how their portal solutions have helped them reduce costs, improve productivity, and grow revenue. Come prepared with questions and leave with new ideas and answers!
Tags : ibm, webinar, ibm websphere, public utility, utilities, revenue, application, reduce costs
     IBM
By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical
     Stratus Technologies
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics