business risk

Results 201 - 225 of 747Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
If you’re running a small to midsize business, you probably already know firsthand how server virtualization can help you compete against the big guys – by reducing costs, lowering risk and increasing agility. Now it’s time to think about storage.
Tags : 
    
Hewlett Packard Enterprise
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
    
Determine (Selectica)
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA’s portfolio is designed to drive efficiency from planning through production. A core component of our continuous delivery portfolio is CA Release Automation, a market-leading application release automation solution that delivers full application deployment automation and release coordination across stages, environments and teams. The solution’s analytic capabilities enable DevOps teams to plan, manage, analyze and optimize the continuous delivery pipeline from a single control point. In addition, the portfolio includes CA Agile Central, CA Agile Requirements Designer, CA Service Virtualization and CA Test Data Manager. We continue to invest in and enhance the portfolio, most recently via the acquisition of BlazeMeter, an innovative, SaaS-based performance and load-testing solution.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem, sdlc, mttr
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : 
mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid, tila respa integrated disclosure, lending efficiency, loan automation, lending automation, mortgage automation, ucd, uniform closing dataset
    
Fiserv
Published By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
Don't let the risk or cost of ransomware storm your organization's castle. it will wreak havoc on your valuable data and impact business continuity. Instead, employ a multi-layer security strategy that not only includes anti-malware, firewall, and hard disk and file encryption, but also data loss prevention technology and standards- based data protection. Each are critical to mitigate cyber security risks and protect vital information so you can avoid business disruption without ever paying a king's ransom.
Tags : 
ransomeware, organization, data, business optimization technology, it protection, commvault
    
Commvault ABM Oct
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. TodaysGeneralCounsel.com suggests that organisations should focus on a broad enterprise-wide information governance strategy developed by IT, legal, records and business stakeholders. Doing so improves governance, risk management and compliance programs. This best practices paper outlines seven important ways that legal teams can make meaningful progress in their digital transformations." .
Tags : 
legal, professionals, digital, practices, docusign, esignature
    
DocuSign UK
Published By: Trimble     Published Date: Jul 24, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: Minimize costly errors before they destroy your profit margin Retain the knowledge of your top estimators, even if they leave Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: Trimble     Published Date: Aug 20, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: • Minimize costly errors before they destroy your profit margin • Retain the knowledge of your top estimators, even if they leave • Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: CheckMarx     Published Date: Nov 02, 2018
As DevOps continues to be widely adopted by fast-moving organizations, software security needs to keep pace to help accelerate software delivery and not slow it down. Is your software security program up to the challenge? By integrating security into the entire software development lifecycle, enterprises can manage their business risk and guarantee secure software delivery at the speed of DevOps. Check out these 10 Essential Best Practices for building and maintaining your modern-day software security program -- from your tools, to your processes, to your people. This eBook will cover the top 10 steps you can take today to help your organization move faster and more securely.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
    
CheckMarx
Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have implemented the technology and processes to become more efficient at delivering client value. But choosing the right construction technology and making a compelling case for investment can be difficult. Download the eBook to demonstrate how construction software can be a significant driver of ROI across your business. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
Looking for Construction Project Management Software? Ensure you don’t make an expensive mistake. Downloading this eBook will help you build a framework for evaluating and choosing the construction management software solution to fit your business. What you’ll learn: ? How to identify and define your needs ? The functionality you should assess ? Specific features to look for ? How to evaluate a software vendor Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their projects. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Procore     Published Date: Jul 08, 2019
Download the ebook to learn how construction technology is making UK & Ireland contractors more resilient and competitive. And follow the 7-step practical guide for kick-starting a digital construction strategy in your business, regardless of its size and complexity. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: NAVEX Global     Published Date: Jul 17, 2017
Screening your third party vendors and business partners for risk can be a challenging process. With so many different factors to consider, where do you even begin? We've developed our Anti-Bribery and Corruption Risk Assessment Checklist so you can streamline your compliance risk assessment processes and ensure each potential risk is addressed. Keep up with changing European laws and regulations with this checklist.
Tags : 
training, communication, culture, controls, oversight, policies, risk assessment
    
NAVEX Global
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com