it risk management

Results 351 - 375 of 449Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Feb 29, 2012
This paper presents technologies and recommendations for not only surviving, but thriving, as a marketer in today's demanding and dynamic business climate.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This paper presents the 5 most common practices that result in losing a customer and how to avoid those pitfalls. You'll also learn how more customer-centric measures can help you deepen and grow relationships with your most valuable customers.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This white paper includes practical, candid and irreverent advice from Scott on what it really means to be real time in marketing and PR.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
In a webcast co-hosted by the AMA and SAS, presenters described three areas of focus for using social media, and the five best practices for being effective in social media. This paper provides a summary of that webcast.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This white paper provides a blueprint for action for senior marketers and decision makers across the enterprise. It provides straightforward advice on how to build a more durable and profitable customer base.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This collection is part of the ANA Magazine Thought Leadership Series sponsored by SAS. The articles explore the variety of ways to use analytics to create marketing functions that are more accountable and profitable.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Feb 29, 2012
This paper provides an intro to managers and marketing professionals applying analytics to marketing to significantly improve outcomes. It explains not only why you need to make this shift, but also how you get started and what tools you'll need.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Oct 03, 2018
Risks have intensified as retailers and financial organizations embrace new technologies to meet customer demands for convenience. The rise of mobile and online transactions introduces new risks – and with that, new requirements for fraud mitigation. This paper discusses key steps for fighting back against fraud risk by establishing appropriate and accurate data, analytics and alert management.
Tags : 
    
SAS
Published By: SAS     Published Date: Nov 16, 2018
Instances of fraud have become commonplace in many industries, and it’s costing organizations millions of dollars annually and placing corporate brands at risk. But despite significant investments in staff and anti-fraud software, new and emerging fraud threats keep slipping through undetected. Why? Because it’s too costly to keep anti-fraud software current. Paying a vendor to make software changes dramatically increases total cost of ownership. This paper discusses how SAS addresses this challenge with next-generation fraud solutions like SAS Visual Investigator, a cloud-ready investigation and incident management platform that end users can easily configure and adapt to detect new and evolving types of fraud.
Tags : 
    
SAS
Published By: GoToMyPC     Published Date: Apr 06, 2011
This Forrester white paper examines the rise in IT's prioritization of business continuity and disaster recovery (BC/DR) planning.
Tags : 
disaster recovery, business continuity, bc/dr, smbs, enterpriser risk management, data loss, damage control, crisis, security, ddos
    
GoToMyPC
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network, business technology
    
Cisco
Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM
Published By: Esker     Published Date: Jul 17, 2018
No matter what future you see ahead for your accounts payable (AP) organization, one thing is sure: If your organization is going to succeed in the emerging digital trade and commerce environment, it will need to process transactions more efficiently than ever, have faster access to AP information, and be able to act upon information and identify opportunities more quickly. This will require AP organizations to transform their processes with digital technologies. Accounts payable departments that delay their digital transformation initiatives risk falling behind their peers and putting their business at a competitive disadvantage in the global business landscape. This white paper details the growth of digital technologies, the dangers of relying on manual and semi-automated AP payable processes, the benefits of using digital technologies in AP, and how effective change management ensures the success of digital transformation efforts.
Tags : 
    
Esker
Published By: IBM     Published Date: Sep 27, 2013
The challenges faced by midsize businesses remain daunting. An uncertain economic outlook, slow market growth and cost pressures continue to affect most industries. Yet, in most geographies, IT spending by midsize businesses is increasing. This report deals with this cost/benefit equation. Specifically, it compares the IBM i 7.1 operating system deployed on Power Systems with two alternatives: use of Microsoft Windows Server 2008 and SQL Server 2008, and use of x86 Linux with Oracle Database 11g, both deployed on Intel-based servers.
Tags : 
ibm, ibm i 7.1, power systems, it solutions, it costs, risk management, software solutions, it management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
"The implications from the 2013 IBM Global Reputational Risk and IT Study are clear. The question is no longer whether IT risks can damage your corporate reputation, but what you can do to effectively prevent and mitigate these risks. Find out what you can do to protect your reputation from IT risks. Read “Six keys to effective reputational and IT risk management” to learn about: · Practical advice and recommendations to help prevent and mitigate the IT risks that most affect reputation · The emerging role of the Chief Digital Officer · How to use social media as a tool for minimizing reputational damage · How your supply chain can put you at increased reputational risk"
Tags : 
reputational management, risk management, it risk management, ibm, ibm global, it risks, protection, branding, social media, supply chain, supply chain management, chief digital officer, mitigation, corporate reputation, security, it management, business technology
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.
Tags : 
ibm, it management, risk management, risk, risk management strategy, reputational risk, security
    
IBM
Published By: Cisco     Published Date: Nov 17, 2015
In March 2014, Cisco Systems commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco Unified Computing System (UCS). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Cisco UCS on their organizations. To better understand the benefits, costs, and risks associated with a Cisco UCS implementation, Forrester interviewed several customers with multiple years of experience using Cisco UCS. Cisco Unified Computing System and servers unify computing, networking, management, virtualization, and storage access into a single integrated architecture
Tags : 
cisco, ucs, unified computing system, total economic impact, forrester report, it management, wireless, knowledge management, data management
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
The need for threat-focused next-generation firewalls (NGFWs) that can effectively mitigate risks that traditional unified threat management (UTM) and point solutions cannot is highlighted by numerous studies, including one from Cisco that reported that every organization should assume it has been hacked. Cisco threat researchers found malicious traffic was visible on 100 percent of the corporate networks that they observed, with evidence that adversaries had often penetrated those networks and were frequently operating undetected over a long period.
Tags : 
network security, threat management, network management, security
    
Cisco
Published By: IBM     Published Date: Jul 09, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security, it management
    
IBM
Published By: IBM     Published Date: Oct 14, 2014
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, it security, resilience investments, enhanced brand value, security, it management
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation with a proactive, business-centric approach to BCM that highlights critical practices.
Tags : 
business continuity management, risk management, bcm plan, business solutions, it management, knowledge management, platforms, data management
    
IBM
Published By: IBM     Published Date: Apr 06, 2015
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
big data, analytics, unstructured content, enterprise information, ibm, security, it management, knowledge management, storage, data management
    
IBM
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This whitepaper, written in collaboration with TAL Global (a leading security consulting and risk management firm), highlights five case studies to illustrate common legal and security issues associated with BYO.
Tags : 
citrix, security, mobile
    
Citrix Systems, Inc.
Published By: SPSS     Published Date: Mar 31, 2009
This whitepaper details how predictive analysis can help your business.  Predictive analytics help you make better, faster decisions, giving your organization a significant competitive advantage in the technology sector.
Tags : 
spss, predictive analysis, roi, data, data driven decision making, mitigate risk, fraud, real time intelligence, data analysis, analytical methods, strategic planning, customer intimacy, crm, best practices, business intelligence, statistics, statistical analysis, data management, decision-making
    
SPSS
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com