risk management

Results 326 - 350 of 693Sort Results By: Published Date | Title | Company Name
Published By: KPMG     Published Date: Nov 07, 2016
Can a better demand-driven supply chain positively impact the bottom line? The future belongs to the new customer. Customer experience is becoming undeniably more important, yet many companies lack responsive and agile supply chains that can continually adjust to fluctuating customer requirements. Read more.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain
    
KPMG
Published By: KPMG     Published Date: Nov 07, 2016
Manufacturers are gunning for growth and plan to put significant investment into R&D and new markets in order to achieve their ambitions. But without overall market growth, competition will be fierce. Read more.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain
    
KPMG
Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security
    
Canon Solutions America
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
    
Tenable
Published By: Interactive Intelligence     Published Date: Jan 10, 2011
Contact centers face a tall order: Deliver stellar service and real-time response to customers, and still get more out of the workforce without risking burnout and turnover. Lori Bocklund is president of Strategic Contact, and Rachel Wentink is the senior director of Product Management for Interactive Intelligence, and when they discuss how to optimize agent performance and offer outstanding service, it's worth reading.
Tags : 
interactive intelligence, strategic contact, quality monitoring, wfm, workforce maangement
    
Interactive Intelligence
Published By: Trend Micro SPN     Published Date: Jun 15, 2009
Power to the people? Managing technology democracy in the Workplace. A Trend Micro sponsored report by the Economist Intelligence Unit.
Tags : 
trend, trend micro, economist intelligence unit, security, risks, technology democracy, cio, cto
    
Trend Micro SPN
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
    
Mimecast
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models
    
Trillium Software
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
Get the critical information you need to transform your data center by implementing a solution based on the greatest possible computing power with the lowest possible energy expenditure.
Tags : 
energy efficiency, mainline information systems, infrastructure, risk management, thermal performance, environment improvements
    
Mainline Information Systems
Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management, security management, business security
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: IBM     Published Date: May 12, 2008
Challenges like competitive pressures, compliance activities and higher operational costs make service management more critical than ever. To keep up, IT operations must constantly improve visibility, control and automation while bridging the gaps among business, development and daily operations.
Tags : 
itil, service management, governance, risk management, ibm, ibm g&rm, ibm grm
    
IBM
Published By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : 
ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : 
ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
With ever-increasing data growth worldwide, organizations must find smarter ways to store and manage their massive volumes of data. Learn how IBM® Tivoli® Storage Management software solutions help to maximize your current storage environment and reduce operational and capital costs while improving service and managing risks.
Tags : 
storage management, ibm, ibmtivoli, fastback, san, data growth, recovery management, reducing costs
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : 
ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization
    
IBM
Published By: IBM     Published Date: Oct 14, 2009
This paper shows how mid-sized companies can benefit by implementing a virtualization strategy. Unique, industry-leading capabilities from IBM, Intel and VMware are highlighted.
Tags : 
virtualization, unique, roi, it infrastructure, servers, business continuity, system management, risk management
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli
    
IBM
Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Supply Chain Management 2010 and Beyond WP," you'll see how the role of the supply chain manager is shifting from tactical to strategic. And learn why successful supply chains must be strategic, dynamic and customer-driven.
Tags : 
supply chain, ibm, scm, customer driven, talent management, risk management, business process integration
    
IBM
Published By: IBM     Published Date: Oct 28, 2009
In the IBM white paper, "The Smarter Supply Chain of the Future: Global Chief Officer Supply Chain Study," you'll see how sensor technologies, new analytic capabilities and simulation techniques can predict, if not prevent, disruptions before they occur.
Tags : 
supply chain management, ibm, risk, management systems, connectivity, scm, network
    
IBM
Published By: IBM     Published Date: Dec 07, 2010
Energy and utility companies need to manage incidents such as customer complaints or disputes to improve customer service while protecting the business should escalations occur. Advanced case management (ACM) provides enhanced service and risk management throughout the lifecycle of a case.
Tags : 
ibm, advanced case management podcast, acm, energy and utilities industries, customer service, risk management, business intelligence, content and process management
    
IBM
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : 
access control, rules, compliance, governance, risk management, rbac, iam, identity management
    
Aveksa
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management
    
Aveksa
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com