RSS feed Get our RSS feed

News by Topic

risk management

Results 126 - 150 of 709Sort Results By: Published Date | Title | Company Name
By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: IBM Watson Health     Published Date: Nov 30, 2015
This whitepaper features a discussion of how leading healthcare organizations are developing a strategy for risk contracting and population health management.
Tags : ibm, watson health, phytel, infrastructure, finances, healthcare
     IBM Watson Health
By: IBM     Published Date: Feb 03, 2015
Find out how banks are increasing customer profitability, improving operational efficiency and managing risk more effectively with IBM Business Analytics software.
Tags : customer profitability, operational efficiency, business analytics, banking, risk management, security
     IBM
By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : technology, bluecoat, infrastructure
     Blue Coat Systems
By: GoToMyPC     Published Date: Apr 06, 2011
This Forrester white paper examines the rise in IT's prioritization of business continuity and disaster recovery (BC/DR) planning.
Tags : disaster recovery, business continuity, bc/dr, smbs, enterpriser risk management, data loss, damage control, crisis
     GoToMyPC
By: IBM     Published Date: Feb 12, 2014
Develop or restore forecasting health by adhering to the six principles presented in this paper.
Tags : ibm, business analytics, forecasting, budgeting, financial management, risk management
     IBM
By: IBM ILOG.     Published Date: Jul 14, 2009
This white paper explains how a business rule management system can make business process automation easier to understand, maintain and manage. Compare BRMS with other business automation schemes, like traditonal software coding or standard business rule engines. Learn how the Welsh Assembly Government and a United States commercial lender have implemented business rules to make a difference in their business processes.
Tags : ibm, bpm, business, business rule management, brms, hipaa, risk, operational cost
     IBM ILOG.
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
     Recorded Future
By: FICO     Published Date: Nov 03, 2015
Using predictive models.
Tags : model, risk governance, management, analytics, optimization, compliance
     FICO
By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi
Tags : enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security
     Intralinks
By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : collaboration solutions, risk management, business productivity, it efficiency, business users
     Intralinks
By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
     Lookout
By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : ca mainframe, mainframe, application quality, application testing, testing
     CA Mainframe
By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction
     IBM
By: Rsam     Published Date: Apr 28, 2016
Healthcare enterprises are under more scrutiny than ever to demonstrate compliance. With more than 5,000 suppliers, this FORTUNE 50 company needed to automate and streamline their vendor risk management program. Learn why they selected Rsam and the results of their successful implementation.
Tags : rsam, fortune 500, vendor risk management, healthcare enterprise, compliance
     Rsam
By: IBM     Published Date: Jan 20, 2015
Deploying a flexible, user-friendly framework for cloud-based risk modeling across multiple asset classes.
Tags : risk analytics, cloud-based risk modeling, asset classes, asset management, portfolio management, security
     IBM
By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : risk, compliance, audit, risk management, cyber security, fraud
     CEB
By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
     Entrust Datacard
By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
Tags : hardware, tpm, it security, windows, telecommunication, byod
     Dell
By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits
     Cisco
By: Cisco     Published Date: Dec 21, 2016
The Federal Risk and Authorization Management Program (FedRAMP) provides a cost-effective, risk-based approach for the adoption and use of cloud services by U.S. government agencies. FedRAMP processes are designed to assist federal government agencies in meeting Federal Information Security Management Act (FISMA) requirements for cloud systems. By standardizing on security assessment, authorization, and continuous monitoring for cloud products and services, this program delivers costs savings, accelerated adoption, and increased confidence in security to U.S. government agencies that are adopting cloud technologies.
Tags : 
     Cisco
By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : security solutions, protecting data, secure management, cost-effective, security
     Centrify Corporation
By: Druva     Published Date: May 22, 2017
Navigate through today’s data risks with Cloud Information Management. Download now!
Tags : 
     Druva
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics