Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 279Sort Results By: Published Date | Title | Company Name
By: Box     Published Date: May 11, 2015

This white paper focuses on four considerations for a mature mobile strategy to reduce the risk of falling behind other key competitors.

Tags : mature mobile strategy, mobile devices, workflow, security, secure collaboration, it strategy, integration, mobility
    
By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015

Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.

Tags : fiberlink, android, mobile users, strategy, app enabled, scalability, security, device management
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, application security, security management, business management
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper will help you to understand the importance of creating a DRP for your company. This is a critical step in preparing for disaster, improving employee response, reducing downtime, and quickly returning to normalcy.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, write a drp, steps to write a formal drp, backup and recovery
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper illustrates the difference between the two and what each can do to prepare companies for disaster.

Tags : disaster recovery, risk reduction, causes of disasters, how to avoid disasters, protect your business from disasters, test and measurement, backup and recovery, security management
    
By: IBM     Published Date: Apr 15, 2015

Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.

Tags : ibm, it operations, decision makers, analytics, market analysis, monitoring, business intelligence, business metrics
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
By: BitSight Technologies     Published Date: Feb 20, 2015

Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.

Tags : bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the benefits for High-Tech Companies of using eSignature technologies.

Tags : esignature technologies, mcafee, salesforce, linkedin, esignature solutions, authentication, identity management, return on investment
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, application security, authentication
    
By: IBM     Published Date: Feb 13, 2015

Watch this demonstration to learn how the IBM Platform Computing Cloud Service can be used to simplify and accelerate financial risk management using IBM Algorithmics.

Tags : ibm, risk management, data analytics, cloud service, cloud instrastructure, infrastructure, network architecture, network management
    
By: IBM     Published Date: Feb 11, 2015

BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

Tags : ibm, threat protection system, automated response capabilities, it security practices, security, it management, data management, best practices
    
By: IBM     Published Date: Feb 11, 2015

IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management, business activity monitoring
    
By: IBM     Published Date: Feb 11, 2015

IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

Tags : ibm security, business-centric strategies, security solutions, it policies, security, it management, business intelligence, business management
    
By: IBM     Published Date: Feb 11, 2015

IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.

Tags : security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security, business intelligence, risk management
    
By: IBM     Published Date: Feb 11, 2015

With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.

Tags : criminal fraud detection, authentication methods, ibm, criminal detection software, security, software development, business intelligence, risk management
    
By: IBM     Published Date: Feb 11, 2015

Read this white paper to learn more about the emerging attack techniques used by cybercriminals in the mobile channel.

Tags : mobile malware, pc threat techniques, mobile channel, mobile banking functionality, advanced malware, security, mobile data systems, business intelligence
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.

Tags : web application delivery, session hijacking, security, ca single sign-on, application security, policy based management, security policies, single sign on
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: OpenPages GRC Platform: Hypatia Research Group - The Convergence of Enterprise Governance, Risk & Compliance Software Solutions: Best Practices, Benchmarks & Vendor Galaxy Evaluations

Tags : ibm, enterprise governance, risk, compliance software, software solutions, hypatia research, grc, grc software
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: OpenPages GRC: Operational risk management in the world of big data - Unlocking the value of loss event data and driving the risk-aware enterprise

Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: General: Partially cloudy: the benefits of hybrid deployment models

Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
By: IBM     Published Date: Nov 19, 2014

Algorithmics: Back to the future - Revisiting capital and the bank of tomorrow

Tags : ibm, risk management, capital management, cash management, data availability, future banking, business intelligence, return on investment
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: Algo Collateral: Evolution for efficiency - Active Collateral Management

Tags : ibm, efficiency, collateral management, risk management, financial landscape, financial transactions, otc market, financial regulation
    
By: ADP AdvancedMD     Published Date: Nov 17, 2014

Due to the numerous upgrades that will be needed to both software systems and manual processes, health care providers must begin preparing now. Those who do not take steps immediately put the stability and financial health of their private practice at risk.

Tags : adp, advancedmd, medical knowledge, technology, healthcare, health organizations, conversion plan, icd-10
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.