Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 258Sort Results By: Published Date | Title | Company Name
By: Singlehop     Published Date: Oct 01, 2014

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.

Tags : ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
    
By: Singlehop     Published Date: Oct 01, 2014

As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.

Tags : cloud security, infrastructure threats, security data, chp infrastructure, security, it management, business analytics, risk management
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

Mobile device Management was just the beginning of the enterprise journey towards complete mobility. Learn why enterprise mobility management is now needed for all devices and data for work.

Tags : mobile device management, mobility, enterprise mobility, mobile security, application management, it management, knowledge management, best practices
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices
    
By: Kaspersky     Published Date: Feb 14, 2014

In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.

Tags : kaspersky, security, it security, data protection, intrusion detection, risk management, vulnerability management
    
By: Marketo     Published Date: Jul 31, 2012

The Definitive Guide to Marketing Metrics and Marketing Analytics shows marketing professionals how to talk the talk of C-level executives in terms of forecasting and reporting, and walk the walk to the revenue table by leveraging metrics that matter.

Tags : definitive, guide, marketing, metrics, analytics, marketo, roi, leans
    
By: Bit9     Published Date: Sep 30, 2014

Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure. However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit. Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.

Tags : security controls, risk compliance, it auditor, security, it management, best practices, business activity monitoring, risk management
    
By: Bit9     Published Date: Sep 30, 2014

This new eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : it security, pci compliance, industry regulations, security solutions, security, it management, risk management, content management system
    
By: Bit9     Published Date: Sep 30, 2014

For enterprises, relying on perimeter defenses as well as traditional endpoint protection is no longer suitable to combat today’s threats. There is a good reason for that, since solutions including signature-based antivirus have not kept pace in combating advanced threats or zero-day attacks leaving devices defenseless.

Tags : endpoint protection, server security, perimeter defenses, security, business analytics, risk management, content management system, service management
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : server security, virtual servers, data breaches, targeted attacks, security, business analytics, risk management, secure content management
    
By: IBM     Published Date: Sep 02, 2014

This two year research initiative in collaboration with IBM focuses on key trends, best practices, challenges, and priorities in enterprise risk management and covers topics as diverse as culture, organizational structure, data, systems, and processes.

Tags : ibm, risk management, best practices, erm, enterprise risk management, survey, collaboration
    
By: IBM     Published Date: Sep 02, 2014

To get timely and trusted insights from Risk Analytics while minimizing IT risk and improving time-to-value, IBM is delivering an Application Ready Solution for Algorithmics. This integrated offering, anchored on a validated scalable high-performance clustered reference architecture, delivers the timely risk insights firms need to lower Tier 1 capital.

Tags : ibm, risk management, risk analytics, data analytics, finance reports, business analytics, business activity monitoring, business management
    
By: IBM     Published Date: Sep 02, 2014

With tougher regulations and continuing market volatility, financial firms are moving to active risk management with a focus on counterparty risk. Join IBM Algorithmics and IBM Platform Computing to gain insights on this trend and on technologies for enabling active "real-time" risk management.

Tags : ibm, risk management, data management, grid computing, grid management, business analytics
    
By: IBM     Published Date: Jul 09, 2014

If you're unhappy with the state of your current disaster recovery operations, this Q and A is a must-read. IBM cloud experts share information on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps your organization running in the event of disaster or disruption, limiting the risk of business losses and brand damage.

Tags : ibm, disaster recovery, disaster recovery solution, cloud technology, it operation, restoration, disaster as a service, draas
    
By: IBM     Published Date: Jul 09, 2014

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : ibm, it risk management, risk management, reputational management, outsourcing, managed services, risk mitigation, security
    
By: IBM     Published Date: Jun 17, 2014

The Risk Enabled Enterprise® is a two-year research initiative from Chartis, sponsored by IBM, that looks at the enablers of enterprise risk management (ERM).

Tags : ibm, risk, business analytics, risk enabled enterprise, enterprise risk management, erm, it management, risk management
    
By: IBM     Published Date: Jun 17, 2014

Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. As global mandates and compliance directives continue to snowball, organizations are faced with an imminent need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. Business intelligence and reporting also provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance.

Tags : ibm, corporate governance, risk, compliance, grc, erm, risk management, business analytics
    
By: IBM     Published Date: Jun 17, 2014

Key findings from an industry roundtable on enterprise risk transformation in Canadian banking.

Tags : ibm, risk enabled enterprise, enterprise risk management, erm, big data, data aggregation, corporate governance, business analytics
    
By: Citrix     Published Date: May 08, 2014

A white paper on the increasing mobility of organisations and the technology available to facilitate and secure throughout this change.

Tags : enterprise, mobility, security mobility, citrix, netscaler, application security, internet security, network security appliance
    
By: IBM     Published Date: Apr 22, 2014

Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.

Tags : ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance
    
By: IBM     Published Date: Apr 22, 2014

Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.

Tags : ibm, it management, risk management, risk, risk management strategy, reputational risk, security
    
By: EMC Corporation     Published Date: Mar 20, 2014

The top five questions to ask regarding Identity and Access Management.

Tags : emc, iam, strategic solutions, access reviews, access request, identity management, business intelligence, enterprise resource planning
    
By: EMC Corporation     Published Date: Mar 20, 2014

An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.

Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business intelligence
    
By: EMC Corporation     Published Date: Mar 20, 2014

An infographic showing the benefits of an RSA Averska IAM Solution.

Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business integration
    
By: IBM     Published Date: Feb 12, 2014

Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.

Tags : ibm, business analytics, finance, forecasting, risk management, business forecasting, predictive analysis, forecasting lexicon
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.