Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 245Sort Results By: Published Date | Title | Company Name
By: ForeScout     Published Date: Aug 14, 2012

The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.

Tags : pad, mine, enabling, secure, personal, mobile, device, use
    
By: IDology     Published Date: Feb 11, 2008

There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?

Tags : identity management, iam, access management, iam, risk management, identity theft, hackers, fraud
    
By: LockLizard     Published Date: Jun 10, 2009

Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.

Tags : pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions
    
By: Lumension     Published Date: Mar 28, 2011

Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.

Tags : lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft, anti spam, anti spyware
    
By: Lumension     Published Date: Aug 15, 2010

Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.

Tags : cyber security, application security, risk management, third party applications, endpoint security, cyber crime, anti virus, hacker detection
    
By: Lumension     Published Date: Nov 18, 2010

No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.

Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
    
By: Intellitactics     Published Date: Feb 28, 2008

Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.

Tags : siem, intellitactics, compliance, security management, risk management
    
By: BMC Software     Published Date: Dec 21, 2011

Five steps can take you from a costly mishmash to benefits like increased productivity, lower costs, and better service.

Tags : scheduler, enterprise, enterprise workload, automation, bmc, productivity, control, application integration
    
By: Lumension     Published Date: Nov 19, 2010

Finding Ways to Balance IT Risk and Productivity. Learn how to strike a happy balance that allows for the safe use of new technologies - without the risk.

Tags : lumension security, consumerized workforce, it risk, productivity, collaborative, web 2.0 applications, social media platform, application security
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.

Tags : sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation
    
By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012

Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.

Tags : navisite, technology, cloud comptuing, security, risk management, security management, business security, application security
    
By: SAS     Published Date: Mar 01, 2012

This white paper provides a top-level overview explaining what business analytics can do for your company - and the 8 key steps to accelerating product innovation, optimizing pricing and discovering drivers of financial performance.

Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
    
By: IBM     Published Date: Oct 01, 2012

his independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.

Tags : virtualization, it infrastructure, software partitioning, reduce costs, risk management, server virtualization
    
By: AT&T     Published Date: Jun 25, 2008

Whether you’re implementing new technologies, upgrading existing infrastructure or evaluating current needs, consultants can help you identify and document the gap between your current situation and a desired future state. When an assessment is done correctly, it can provide a solid foundation for successful implementation and improvement. The consultant first interviews stakeholders, analyzes data, and compares your business against best practices or specific industry competitors.

Tags : consulting, consult, consultant, management, expert, expertise, guidance, implementation
    
By: Technolytics     Published Date: Oct 05, 2007

Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.

Tags : spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
    
By: EMC Corporation     Published Date: Mar 20, 2014

An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.

Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business intelligence
    
By: IBM     Published Date: Oct 10, 2013

Like many financial institutions today, the full-service Swedish bank featured in this case study has responded to changing customer needs, evolving from its original founding more than 100 years ago. As a result, the bank has realized remarkable success. Of course, along with that success have come significant challenges. New business growth, plus the rise in Internet and mobile banking, intensified the bankís need for continuous availability of its IT infrastructure. IBM Resiliency Consulting Services helped the bank strengthen and streamline its environment. In the case study, you can read how teaming with IBM helped the bank meet recovery point and recovery time objectives; mitigate risk; and provide the flexibility to meet business demands without added IT expense.

Tags : ibm, resiliency consulting, ibm, full-service swedish bank, hyperswap, optimizing risk management, risk management, bank optimization
    
By: Symantec.cloud     Published Date: Feb 12, 2010

Understand the legal issues if you do not conduct a risk assessment before creating your AUP.

Tags : messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance
    
By: Zycus     Published Date: May 01, 2009

The global recession is taking no prisoners. Neither industry, nor region, nor company-size has provided shelter from its impact. Within the enterprise, few business functions have been unaffected. Yet, as this business downturn continues, the Chief Procurement Officer's ("CPO") agenda and the CEO's agenda have started to converge.

Tags : zycus, recession, downturn, procurement, sourcing companies, sourcing services, sourcing, reverse auction
    
By: ParAccel     Published Date: Oct 22, 2010

This white paper outlines these challenges and provides a clear path to providing the accelerated insight needed to perform in today's complicated business environment to reduce risk, stop fraud and increase profits.

Tags : paraccel, financial services, macroeconomic risk, fraud, analytic database, performance, application performance management, business analytics
    
By: ParAccel     Published Date: Dec 16, 2010

This white paper outlines these challenges and provides a clear path to providing the accelerated insight needed to perform in today's complicated business environment to reduce risk, stop fraud and increase profits.

Tags : paraccel, financial services, macroeconomic risk, fraud, analytic database, performance, application performance management, business analytics
    
By: Epicor     Published Date: Apr 01, 2009

This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.

Tags : epicor, grc, governance risk and compliance, supply chain visibility, erp solutions, expense management, data auditing, it management
    
By: Tripwire     Published Date: Mar 31, 2009

Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.

Tags : center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation
    
By: IBM     Published Date: Oct 30, 2013

Learn how leading companies are using performance management analytics to unlock business value.

Tags : ibm, disclosure management, financial disclosure, risk management, complex reporting, global statutory reporting, financial data, operational data
    
By: SAS     Published Date: Mar 01, 2012

The traditional managed reporting approach to BI is challenged to keep up with changing demand for business information. This research finds that providing business users with highly visual/interactive tools can help ensure they get what they need.

Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.