risk management

Results 1 - 25 of 687Sort Results By: Published Date | Title | Company Name
Published By: Commvault ABM Oct     Published Date: Jul 17, 2019
Automating disaster recovery and disaster recovery testing saves time and budget, plus reduces risk when there is an actual emergency. With weather events, ransomware, and other outages distruping your business, you need a modern disaster recovery solution that really works at time of disaster. Choosing the right disaster recovery solution can be the difference between keeping your business up and running or going dark during an emergency. Learn hoe the commvault platform for data management provides availability for your business against today's real world outages
Tags : 
    
Commvault ABM Oct
Published By: Commvault ABM Oct     Published Date: Jul 17, 2019
Construction firm reduces costs, complexity, and risk by protecting information in the cloud and at remote sites through a single data management solution.
Tags : 
    
Commvault ABM Oct
Published By: Sift     Published Date: Jul 12, 2019
"As online fraud detection grows in complexity and demand, what qualities should security and risk management leaders look out for in a solution? Get key recommendations for navigating the online fraud detection market from Gartner Research. READ THIS GUIDE TO FIND OUT: Where the online fraud detection market is heading A list of vendors in the online fraud detection space, and their capabilities Recommendation for how to incorporate AI and machine learning into your fraud prevention approach "
Tags : 
    
Sift
Published By: Procore     Published Date: Jul 08, 2019
Download the ebook to learn how construction technology is making UK & Ireland contractors more resilient and competitive. And follow the 7-step practical guide for kick-starting a digital construction strategy in your business, regardless of its size and complexity. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Citrix ShareFile     Published Date: Jul 02, 2019
Today's businesses need to drive innovation to seize new opportunity, but cloud complexities can slow the agility needed for that innovation. That doesn't have to be the case. In fact, over fifty percent of organizations now use a multi-cloud strategy to help determine their cloud needs, and if you don't have one, we can help. Citrix Workspaces helps reduce cloud complexity, minimize security risks, and deliver a better user experience. Download our e-book and find out how a secure digital workspace: • Centralizes workspace management • Secures your SaaS and web apps, data, and clouds • Makes it a lot easier to scale your cloud infrastructure as needed
Tags : 
    
Citrix ShareFile
Published By: MuleSoft     Published Date: Jun 27, 2019
MuleSoft’s Government Cloud is an industry-leading FedRAMP-compliant cloud environment for building and deploying APIs and integrations with Anypoint Platform. MuleSoft’s US Federal Risk and Authorization Management Program (FedRAMP) compliant-solution enables government agencies to build and secure connections between their applications and citizen data. Download this whitepaper to learn: How MuleSoft’s Government Cloud enables agencies to increase project delivery speed by 3x. Why FedRAMP compliance reduces on-premises infrastructure costs. How government agencies can develop, deploy, manage, and monitor integrations and APIs in the cloud to rapidly expand cloud services.
Tags : 
    
MuleSoft
Published By: VMware     Published Date: Jun 21, 2019
Prime your business for growth with a software-defined approach. The current business-enterprise climate demands robust connectivity and delivery in services. As IT executives continue to invest in integrated infrastructure, companies that remain committed to hardware-centric infrastructure are being left behind and subsequently are exposing their enterprises to risk and loss. Liabilities include time wastage and financial costs in the management and maintenance of legacy infrastructure, creating a deficit in executives’ energy when it comes to innovation and future planning. VMware’s Hyperconverged Infrastructure (HCI) is a malleable, sophisticated solution which facilitates the vital transition from physical to virtualized storage solutions. HCI is the foundation for the Software-Defined Data Center (SDDC) destined for leading enterprise operations.
Tags : 
    
VMware
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Visionary for 2nd year in a row, in the Gartner 2018 Magic Quadrant for NGFW Gartner has named Forcepoint sole Visionary in their 2018 Magic Quadrant for NGFW, for ability to execute and completeness of vision. According to Gartner, “In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.”*
Tags : 
    
Forcepoint
Published By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: • the risks associated with AI and the challenge of managing them • a 17-category Risk & Controls framework for AI • in-depth details for key categories, including security management, business continuity and knowledge management • an essential glossary of AI terms.
Tags : 
    
KPMG
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems, safety instrumented systems
    
Schneider Electric
Published By: FICO EMEA     Published Date: May 31, 2019
: FICO commissioned an independent research study by TM Forum to look at how global telecommunication providers are using (and plan to use) machine learning and advanced analytics to improve the customer experience in credit risk and beyond. This in-depth report includes key insights from a global survey as well as executive interviews with leading communication service providers such as Telstra, Vodafone, Sky, Globe Telecom, and BT on their vision for leveraging artificial intelligence to stop fraud, better engage customers across channels, improve risk management, and drive collection results. Read this report to understand: o What CSPs see as the biggest drivers for deploying advanced analytics over the next two years o How and where BT, Globe Telecom, Vodafone UK, Sky and Telstra are using analytics, from marketing through origination o The opportunities and pitfalls around financing devices as opposed to or in addition to subsidising them o The scope for analytics to improve c
Tags : 
csp, advanced analytics, telco, improve credit risk, reduce fraud loss
    
FICO EMEA
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have implemented the technology and processes to become more efficient at delivering client value. But choosing the right construction technology and making a compelling case for investment can be difficult. Download the eBook to demonstrate how construction software can be a significant driver of ROI across your business. Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
The successful construction companies of tomorrow will be those that have critically reviewed how they manage their business and how they run their projects, making changes to their systems and processes to become more efficient at delivering client value. Download this eBook to learn exactly how construction technology can help your business remain competitive by: ? Increasing efficiency and productivity ? Reducing delays and costs ? Enabling better communication and collaboration ? Improving customer satisfaction ? Engaging an ever-evolving, tech savvy workforce Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their business. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading
Tags : 
    
Procore
Published By: Procore     Published Date: May 28, 2019
Looking for Construction Project Management Software? Ensure you don’t make an expensive mistake. Downloading this eBook will help you build a framework for evaluating and choosing the construction management software solution to fit your business. What you’ll learn: ? How to identify and define your needs ? The functionality you should assess ? Specific features to look for ? How to evaluate a software vendor Procore is a construction management platform that improves efficiency and reduces risk by giving contractors complete control and visibility of their projects. Project Management, Quality & Safety, Construction Financials, and Field Productivity tools give office and site-based users access to the information and functionality they need, on any mobile device. As a platform, Procore’s ability to integrate with other leading applications streamlines process and insights across all aspects of a contractor’s projects and business.
Tags : 
    
Procore
Published By: TIBCO Software     Published Date: May 16, 2019
Financial Services is an industry driven by disruption. Transformative business models such as low-cost brokerages, innovative investment products like ETFs, and the huge regulatory mandates like Gramm-Leach-Bliley are but a few examples. Here are some others: • New fintech firms such as a recent nine billion dollar investment in Ant Financial Services Group and myriad other venture capital-led fintech startups targeting well established segments across the financial services industry • Robo-advisor services powered by artificial intelligence and machine learning intermediating financial advisors and portfolio managers alike • Ever changing regulatory and risk management mandates, such as GDPR, Basel III, and Open Banking, transforming customer engagement and capital allocation Read this whitepaper to learn how you can overcome these and other disruptions.
Tags : 
data, applications, analytics, algorithms, innovation, cloud, technology, customer, banking
    
TIBCO Software
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks
Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
The growing need for data governance, risk and compliance, data analysis and data value still drives strategic requirements in metadata management and the growth of its solutions. Data and analytics leaders can use this vendor evaluation to find the most appropriate solution for their organization.
Tags : 
    
Group M_IBM Q2'19
Published By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com