Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 243Sort Results By: Published Date | Title | Company Name
By: Global Knowledge     Published Date: Feb 14, 2014

Are you involved with purchasing technology for either personal use or your company? If so, learn what you need to know and what can you do.

Tags : global knowledge, technology purchase, supply chain, mobile workers, intrusion detection software, persistent threats, vendors, purchasing processes
    
By: Kaspersky     Published Date: Feb 14, 2014

Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.

Tags : patch management, cybersecurity, firewalls, malware, hackers, virus, threats, network security
    
By: EMC Corporation     Published Date: Mar 20, 2014

The top five questions to ask regarding Identity and Access Management.

Tags : emc, iam, strategic solutions, access reviews, access request, identity management, business intelligence, enterprise resource planning
    
By: EMC Corporation     Published Date: Mar 20, 2014

An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.

Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business intelligence
    
By: EMC Corporation     Published Date: Mar 20, 2014

An infographic showing the benefits of an RSA Averska IAM Solution.

Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business integration
    
By: IBM     Published Date: Feb 12, 2014

Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.

Tags : ibm, business analytics, finance, forecasting, risk management, business forecasting, predictive analysis, forecasting lexicon
    
By: IBM     Published Date: Feb 12, 2014

Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).

Tags : ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management
    
By: IBM     Published Date: Feb 12, 2014

Develop or restore forecasting health by adhering to the six principles presented in this paper.

Tags : ibm, business analytics, forecasting, budgeting, financial management, risk management, return on investment
    
By: IBM     Published Date: Jan 10, 2014

Independent research by Wintergreen Research, Inc. shows "Dramatic savings brought by IBM Rational automated test solutions".  Read this paper to see how you can see a positive ROI through the ability to minimize cost and time to identify errors and diminish subsequent impacts of defects using test automation and service virtualization.

Tags : ibm, wintergreen research, software testing, service virtualization, software development, testing, automation, quality assurance
    
By: IBM     Published Date: Jan 02, 2014

Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information---based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits. Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information---based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits.

Tags : ibm, business analytics, midsize businesses, geeknet, business intelligence, customer volatility, market volatility, variety of data
    
By: Citrix     Published Date: Nov 13, 2013

While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

Tags : mobile computing, wireless application software, wireless infrastructure, wireless security, risk management
    
By: Qualys     Published Date: Nov 05, 2013

Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.

Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime
    
By: IBM     Published Date: Oct 30, 2013

Learn how leading companies are using performance management analytics to unlock business value.

Tags : ibm, disclosure management, financial disclosure, risk management, complex reporting, global statutory reporting, financial data, operational data
    
By: IBM     Published Date: Oct 30, 2013

Learn how you can extend the narrative reporting capabilities of your entire organization--while maintaining auditability and control.

Tags : ibm, cognos disclosure management, business intelligence, data collection, aggregation, data repository, executive management, decrease risks
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.

Tags : sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation
    
By: IBM     Published Date: Oct 24, 2013

Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.

Tags : ibm, mastering risk, business forecasting, business analytics, ibm software, variation, predictable risk, discontinuities
    
By: IBM     Published Date: Oct 24, 2013

Learn how automating 'Last Mile of Finance' processes can help CFOs and their finance teams meet expanded reporting requirements--including XBRL tagging.

Tags : ibm, cognos disclosure management, business intelligence, data collection, last mile of finance, account reconciliation, internal management, financial reporting
    
By: IBM     Published Date: Oct 24, 2013

Tasked with reporting quarterly, annual revenue results, providing “numbers” just doesn’t cut it anymore for CFOs.

Tags : ibm, cfo research, company story, company value, financial reports, more automation, more variance analysis, keying of information
    
By: IBM     Published Date: Oct 10, 2013

Like many financial institutions today, the full-service Swedish bank featured in this case study has responded to changing customer needs, evolving from its original founding more than 100 years ago. As a result, the bank has realized remarkable success. Of course, along with that success have come significant challenges. New business growth, plus the rise in Internet and mobile banking, intensified the bank’s need for continuous availability of its IT infrastructure. IBM Resiliency Consulting Services helped the bank strengthen and streamline its environment. In the case study, you can read how teaming with IBM helped the bank meet recovery point and recovery time objectives; mitigate risk; and provide the flexibility to meet business demands without added IT expense.

Tags : ibm, resiliency consulting, ibm, full-service swedish bank, hyperswap, optimizing risk management, risk management, bank optimization
    
By: IBM     Published Date: Oct 10, 2013

Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven common misconceptions about disaster recovery. You'll also discover how new technologies can help modernize disaster recovery efforts.

Tags : avoid pitfalls, business pitfalls, disaster recovery, recovery plans, business recovery, evolving business, business expectations, business threats
    
By: IBM     Published Date: Oct 10, 2013

In an around-the clock business world, you need nearly instantaneous failover and failback of your critical applications. Otherwise, you risk business losses and brand damage in the event of disruption or disaster. But how can you improve your existing disaster recovery operations? Read this brochure to learn how the power of cloud technologies can help you increase recovery speed, reliability and scalability

Tags : cloud, cloud technologies, cloud computing, applications, critical applications, applications management, risk, business losses
    
By: IBM     Published Date: Oct 10, 2013

Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.

Tags : reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
    
By: GeoTrust     Published Date: Aug 09, 2013

As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.

Tags : nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
By: TIBCO     Published Date: May 15, 2013

Integration may not be new, but its role has drastically changed. Once used simply for support, it is now an enabler – serving as an indispensable foundation critical to achieving agility, efficiency, and growth. Done well, it can drive better business decisions, more cost-effective operations, and be the catalyst for competitive advantage. Architected without a clearly defined strategy, however, integration will fail to deliver on its promise. What are some of the pitfalls you can avoid when augmenting an existing infrastructure to maximize performance, results, and success? Read on.

Tags : integration, infrastrucutre, performance, enterprise, efficiency, growth, application integration, application performance management
    
By: Caristix     Published Date: May 03, 2013

The costs and risks associated with the entire interfacing lifecycle are no longer acceptable in a world that requires fast turnarounds and go-live dates. Those implementing HL7 interfaces can tap into new – and proven – best practices for more effective scoping and overall project success.

Tags : hl7, integration, interface, midical, heathcare, costs, risks, interfacing project
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.