Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 249Sort Results By: Published Date | Title | Company Name
By: 6th Sense Analytics     Published Date: Oct 11, 2007

This whitepaper asserts that moving to the next generation of software development and sourcing requires moving from art to science. Given how dependent we are on software as a foundation for every product and service, anything less creates a climate of risk, uncertainty, and unjustifiable costs that undermines our ability to compete in a global marketplace.

Tags : development, software development, offshore, offshoring, outsource, outsourcing, programming, 6th sense
    
By: Aconex     Published Date: Jun 18, 2008

In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.

Tags : risk management, collaboration, web collaboration, web-based collaboration, aconex
    
By: Actimize     Published Date: Oct 10, 2007

According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.

Tags : auditing, audit, finserve, finserv, financial services, data theft, identity theft, data protection
    
By: Arbor     Published Date: Sep 20, 2013

Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation

Tags : distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
    
By: Arbor     Published Date: Sep 20, 2013

Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.

Tags : distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions
    
By: Arbor Networks     Published Date: Feb 04, 2011

Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.

Tags : ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation
    
By: AT&T     Published Date: Nov 07, 2011

Reach For the Cloud to Transform How You Deliver Voice Services and Elevate the Value of Voice.

Tags : cloud services, cloud computing, hosted voice solution, voice services, at&t, att, at+t, crm
    
By: AT&T     Published Date: Nov 07, 2011

Organizations are responding to customer needs by shifting workforces into the flow of their lives resulting in an expansion of remote connectivity.

Tags : remote workers, managed remote service, distributed workforce, att, at&t, at+t, customers, mobile computing
    
By: AT&T     Published Date: Jun 25, 2008

Whether you’re implementing new technologies, upgrading existing infrastructure or evaluating current needs, consultants can help you identify and document the gap between your current situation and a desired future state. When an assessment is done correctly, it can provide a solid foundation for successful implementation and improvement. The consultant first interviews stakeholders, analyzes data, and compares your business against best practices or specific industry competitors.

Tags : consulting, consult, consultant, management, expert, expertise, guidance, implementation
    
By: Avalere     Published Date: Apr 02, 2007

Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.

Tags : mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
By: Aveksa     Published Date: Feb 04, 2008

User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.

Tags : access control, user access, access, permissions, risk, risk management, compliance, governance
    
By: Aveksa     Published Date: Dec 07, 2007

Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.

Tags : access control, access certification, compliant, certification, rules, compliance, governance, risk management
    
By: Aveksa     Published Date: Nov 26, 2007

Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.

Tags : access control, rules, compliance, governance, risk management, rbac, iam, identity management
    
By: Blue Lane     Published Date: Oct 01, 2007

The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.

Tags : healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa
    
By: BMC Software     Published Date: Dec 21, 2011

Join in this conversation with John McKenny, BMC's VP of Worldwide Marketing for MSM, as we uncover the advantages of dynamic workload management.

Tags : consolidate, schedulers, infrastructure, enterprise, workloads, enterprise workload, mttr, unified solution
    
By: BMC Software     Published Date: Dec 21, 2011

Changing or consolidating job schedulers may seem daunting. However, the benefits of switching to enterprise workload automation outweigh the risks.

Tags : consolidate, schedulers, infrastructure, enterprise, workloads, enterprise workload, mttr, unified solution
    
By: BMC Software     Published Date: Dec 21, 2011

This Executive Brief discusses IDC's perspective on how enterprise workload management requirements are changing and highlights the ways that workload automation solutions can address these emerging requirements

Tags : consolidate, schedulers, infrastructure, enterprise, workloads, enterprise workload, mttr, unified solution
    
By: BMC Software     Published Date: Dec 21, 2011

Read this whitepaper to find out just how valuable a consolidation effort can be.

Tags : consolidate, schedulers, infrastructure, enterprise, workloads, enterprise workload, mttr, unified solution
    
By: BMC Software     Published Date: Dec 21, 2011

With a single, integrated point of control, IT can lower costs, improve compliance, and be more agile. Read on to find out how...

Tags : consolidation, schedule, schedulers, infrastructure, workforce, control, operating system, compliance
    
By: BMC Software     Published Date: Dec 21, 2011

Five steps can take you from a costly mishmash to benefits like increased productivity, lower costs, and better service.

Tags : scheduler, enterprise, enterprise workload, automation, bmc, productivity, control, application integration
    
By: Borland Software     Published Date: Apr 09, 2012

SilkPerformer is a cost-effective, enterprise-class performance testing solution for optimizing the performance of business apps. SilkPerformer enables performance tests that accurately simulate peak demand loads and isolate performance bottlenecks.

Tags : performance testing, software testing, application performance, performance testing tool, application integration, application performance management, best practices, business activity monitoring
    
By: Caristix     Published Date: May 03, 2013

The costs and risks associated with the entire interfacing lifecycle are no longer acceptable in a world that requires fast turnarounds and go-live dates. Those implementing HL7 interfaces can tap into new – and proven – best practices for more effective scoping and overall project success.

Tags : hl7, integration, interface, midical, heathcare, costs, risks, interfacing project
    
By: CDW Symantec     Published Date: Aug 02, 2012

With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.

Tags : data, identity, security, network, protection, mobile, security, documents
    
By: CenturyLink     Published Date: Nov 18, 2011

There are more people on earth than total IPv4 addresses, and they're expected to run out by the end of 2011. Preparing for the transition now can help you maintain business continuity during the changeover while taking advantage of immediate business benefits.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: Citrix     Published Date: May 08, 2014

A white paper on the increasing mobility of organisations and the technology available to facilitate and secure throughout this change.

Tags : enterprise, mobility, security mobility, citrix, netscaler, application security, internet security, network security appliance
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.