it risk management

Results 201 - 225 of 453Sort Results By: Published Date | Title | Company Name
Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Interactive Intelligence     Published Date: Jan 10, 2011
Contact centers face a tall order: Deliver stellar service and real-time response to customers, and still get more out of the workforce without risking burnout and turnover. Lori Bocklund is president of Strategic Contact, and Rachel Wentink is the senior director of Product Management for Interactive Intelligence, and when they discuss how to optimize agent performance and offer outstanding service, it's worth reading.
Tags : 
interactive intelligence, strategic contact, quality monitoring, wfm, workforce maangement
    
Interactive Intelligence
Published By: Trend Micro SPN     Published Date: Jun 15, 2009
Power to the people? Managing technology democracy in the Workplace. A Trend Micro sponsored report by the Economist Intelligence Unit.
Tags : 
trend, trend micro, economist intelligence unit, security, risks, technology democracy, cio, cto, team, human resources management, eiu, technology director, risks
    
Trend Micro SPN
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models, cat, centroid, collective catastrophe, multilingual data, risk exposure
    
Trillium Software
Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management, security management, business security
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: IBM     Published Date: May 12, 2008
Challenges like competitive pressures, compliance activities and higher operational costs make service management more critical than ever. To keep up, IT operations must constantly improve visibility, control and automation while bridging the gaps among business, development and daily operations.
Tags : 
itil, service management, governance, risk management, ibm, ibm g&rm, ibm grm
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : 
ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : 
ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization
    
IBM
Published By: IBM     Published Date: Oct 14, 2009
This paper shows how mid-sized companies can benefit by implementing a virtualization strategy. Unique, industry-leading capabilities from IBM, Intel and VMware are highlighted.
Tags : 
virtualization, unique, roi, it infrastructure, servers, business continuity, system management, risk management
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli
    
IBM
Published By: IBM     Published Date: Dec 07, 2010
Energy and utility companies need to manage incidents such as customer complaints or disputes to improve customer service while protecting the business should escalations occur. Advanced case management (ACM) provides enhanced service and risk management throughout the lifecycle of a case.
Tags : 
ibm, advanced case management podcast, acm, energy and utilities industries, customer service, risk management, business intelligence, content and process management, analytics, business rules, collaboration
    
IBM
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology
    
IDology
Published By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : 
pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions, adobe, affiliate scheme, footprint, risk management, risk, vulnerabilities, dmca, digital millennium copyright act, adobe reader, usability, encryption, security
    
LockLizard
Published By: LANDesk     Published Date: Aug 26, 2009
Service management solutions have the potential to return very significant hard-currency ROI. Successful implementations dramatically improve decision accuracy, enhance productivity, increase operating efficiency and reduce operational risk by providing comprehensive context for a wide range of management decisions.
Tags : 
avocent, itsm, it service management, itil, integration, sla, it infrastructure library, green it, business management, maturity model, best practices, crm, customer relationship management, crm tools, sla
    
LANDesk
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit
    
Tripwire, Inc
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
ibm, security, identity management, insurance fraud, data protection, risk management
    
IBM Software
Published By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
ibm, security, predictive analytics, security policy, risk management, internet security, security solutions
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing
    
IBM Software
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security
    
Lumension
Published By: IBM     Published Date: Aug 07, 2012
As a claims management professional, you have to deal daily with formidable - and sometimes competing - challenges: provide superior customer experience; achieve operational excellence and cost containment; and effectively manage risk. Predictive analytics can help you improve each of these three outcomes, but more importantly, it helps strike the right balance among these three objectives for each new claim received. Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
improving, claims, management, outcomes, predictive, analytics, claims, management, professional, formidable, competing, superior, customer, experience, operational, excellence, cost, containment, risk, predictive
    
IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com