Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 287Sort Results By: Published Date | Title | Company Name
By: LogMeIn     Published Date: Jun 23, 2015

This infographic illustrates how SaaS deployment model saves you money.

Tags : roi, return of investment, saas, saas deployment model, costs, return on investment, risk management, system management software
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.

Tags : testing, tosca testsuit, test, sap, test portfolios, technology support, sap interfaces, technology
    
By: Nexgate     Published Date: Jun 17, 2015

This report will outline a framework for assigning roles and responsibilities to manage social media risk.

Tags : proofpoint, nexgate, social media risk, social media, risk management, compliance, security policies, content delivery
    
By: IBM     Published Date: Jun 16, 2015

Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.

Tags : enterprise, cloud computing, data centers, cloud-based solutions, it solutions, it functionality, storage architecture, effective resiliency programs
    
By: IBM     Published Date: Jun 16, 2015

An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.

Tags : enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies
    
By: BitSight Technologies     Published Date: Feb 20, 2015

Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.

Tags : bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
By: NAVEX Global     Published Date: Jul 02, 2015

In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions now business can afford to overlook when evaluating and selecting vendor risk management solutions.

Tags : diligence systems, risk management solutions, integrated due diligence, compliance, risk management, workforce management
    
By: Cisco     Published Date: Jun 22, 2015

This paper examines the potential return on investment (ROI) that enterprises with current volume licenses may realise by upgrading to Windows Server 2012 R2 with System Center 2012 R2.

Tags : microsoft windows server 2012, return of investment, roi, system center, upgrading to windows server 2012 r2, return on investment, risk management, windows
    
By: Citrix     Published Date: Jun 03, 2015

This paper reveals 10 questions that will dramatically boost your focus and provide the clarity you need to jump start the process.

Tags : transform and idea into a business, start a business, new business, set up new business, steps to start a new business, tips to start a new business, questions to start a new business, business management
    
By: Box     Published Date: May 11, 2015

This white paper focuses on four considerations for a mature mobile strategy to reduce the risk of falling behind other key competitors.

Tags : mature mobile strategy, mobile devices, workflow, security, secure collaboration, it strategy, integration, mobility
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.

Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
By: IBM     Published Date: Apr 15, 2015

Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.

Tags : ibm, it operations, decision makers, analytics, market analysis, monitoring, business intelligence, business metrics
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, application security, security management, business management
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper will help you to understand the importance of creating a DRP for your company. This is a critical step in preparing for disaster, improving employee response, reducing downtime, and quickly returning to normalcy.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, write a drp, steps to write a formal drp, backup and recovery
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper illustrates the difference between the two and what each can do to prepare companies for disaster.

Tags : disaster recovery, risk reduction, causes of disasters, how to avoid disasters, protect your business from disasters, test and measurement, backup and recovery, security management
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the benefits for High-Tech Companies of using eSignature technologies.

Tags : esignature technologies, mcafee, salesforce, linkedin, esignature solutions, authentication, identity management, return on investment
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, application security, authentication
    
By: IBM     Published Date: Feb 13, 2015

Watch this demonstration to learn how the IBM Platform Computing Cloud Service can be used to simplify and accelerate financial risk management using IBM Algorithmics.

Tags : ibm, risk management, data analytics, cloud service, cloud instrastructure, infrastructure, network architecture, network management
    
By: IBM     Published Date: Feb 11, 2015

BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

Tags : ibm, threat protection system, automated response capabilities, it security practices, security, it management, data management, best practices
    
By: IBM     Published Date: Feb 11, 2015

IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management, business activity monitoring
    
By: IBM     Published Date: Feb 11, 2015

IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

Tags : ibm security, business-centric strategies, security solutions, it policies, security, it management, business intelligence, business management
    
By: IBM     Published Date: Feb 11, 2015

IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.

Tags : security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security, business intelligence, risk management
    
By: IBM     Published Date: Feb 11, 2015

With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.

Tags : criminal fraud detection, authentication methods, ibm, criminal detection software, security, software development, business intelligence, risk management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.