Risk Management White Papers

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 1 - 25 of 274Sort Results By: Published Date | Title | Company Name
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
By: BitSight Technologies     Published Date: Feb 20, 2015

Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.

Tags : bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
By: Docusign     Published Date: Feb 18, 2015

This White Paper reveals the benefits for High-Tech Companies of using eSignature technologies.

Tags : esignature technologies, mcafee, salesforce, linkedin, esignature solutions, authentication, identity management, return on investment
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: Docusign     Published Date: Feb 16, 2015

This White Paper reveals the legal differences of the electronic signatures usage between countries and how this affects for their business.

Tags : laws of electronic signatures, electronic signatures, electronic signature landscapes, docusign, electronic signature legality, digital signature laws, application security, authentication
    
By: IBM     Published Date: Feb 13, 2015

Watch this demonstration to learn how the IBM Platform Computing Cloud Service can be used to simplify and accelerate financial risk management using IBM Algorithmics.

Tags : ibm, risk management, data analytics, cloud service, cloud instrastructure, infrastructure, network architecture, network management
    
By: IBM     Published Date: Feb 11, 2015

IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

Tags : ibm security, business-centric strategies, security solutions, it policies, security, it management, business intelligence, business management
    
By: IBM     Published Date: Feb 11, 2015

IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.

Tags : security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security, business intelligence, risk management
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices
    
By: Kaspersky     Published Date: Feb 14, 2014

In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.

Tags : kaspersky, security, it security, data protection, intrusion detection, risk management, vulnerability management
    
By: IBM     Published Date: Feb 11, 2015

BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

Tags : ibm, threat protection system, automated response capabilities, it security practices, security, it management, data management, best practices
    
By: IBM     Published Date: Feb 11, 2015

IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.

Tags : ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management, business activity monitoring
    
By: IBM     Published Date: Feb 11, 2015

With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.

Tags : criminal fraud detection, authentication methods, ibm, criminal detection software, security, software development, business intelligence, risk management
    
By: IBM     Published Date: Feb 11, 2015

Read this white paper to learn more about the emerging attack techniques used by cybercriminals in the mobile channel.

Tags : mobile malware, pc threat techniques, mobile channel, mobile banking functionality, advanced malware, security, mobile data systems, business intelligence
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.

Tags : web application delivery, session hijacking, security, ca single sign-on, application security, policy based management, security policies, single sign on
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: OpenPages GRC Platform: Hypatia Research Group - The Convergence of Enterprise Governance, Risk & Compliance Software Solutions: Best Practices, Benchmarks & Vendor Galaxy Evaluations

Tags : ibm, enterprise governance, risk, compliance software, software solutions, hypatia research, grc, grc software
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: OpenPages GRC: Operational risk management in the world of big data - Unlocking the value of loss event data and driving the risk-aware enterprise

Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: General: Partially cloudy: the benefits of hybrid deployment models

Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
By: IBM     Published Date: Nov 19, 2014

Algorithmics: Back to the future - Revisiting capital and the bank of tomorrow

Tags : ibm, risk management, capital management, cash management, data availability, future banking, business intelligence, return on investment
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: Algo Collateral: Evolution for efficiency - Active Collateral Management

Tags : ibm, efficiency, collateral management, risk management, financial landscape, financial transactions, otc market, financial regulation
    
By: ADP AdvancedMD     Published Date: Nov 17, 2014

Due to the numerous upgrades that will be needed to both software systems and manual processes, health care providers must begin preparing now. Those who do not take steps immediately put the stability and financial health of their private practice at risk.

Tags : adp, advancedmd, medical knowledge, technology, healthcare, health organizations, conversion plan, icd-10
    
By: Singlehop     Published Date: Oct 01, 2014

DDoS Survival Handbook: The Ultimate Guide to Everything You Need to Know About DDoS Attacks.

Tags : ddos attacks, it security, data breaches, security, it management, best practices, business activity monitoring, risk management
    
By: Singlehop     Published Date: Oct 01, 2014

As cloud adoption grows, Alert Logic has observed a shift in security concerns. While cloud security remains a major concern, the business benefits of moving applications to the cloud are too compelling to resist. Now, having largely committed to a cloud strategy, IT professionals are redirecting their focus to finding the best ways to secure their cloud-based applications and data. Download the Cloud Security Report today to gain insight on how Alert Logic continues its practice of uncovering trends that threaten both cloud and on-premises environments.

Tags : cloud security, infrastructure threats, security data, chp infrastructure, security, it management, business analytics, risk management
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

Mobile device Management was just the beginning of the enterprise journey towards complete mobility. Learn why enterprise mobility management is now needed for all devices and data for work.

Tags : mobile device management, mobility, enterprise mobility, mobile security, application management, it management, knowledge management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

Most organizations must comply with multiple standards covering privacy, corporate financial data, Protected Health Information and credit card data. Fortunately, the overlapping standards agree on a single concept; implementing appropriate security controls to protect information from improper disclosure. However, GRC requirements do not exist in a vacuum. Organizational objectives must also be supported. Critical functions can be disrupted if business needs are not considered when establishing compliance activities. In addition, providing evidence that the appropriate controls are in place and enforced is a requirement of any audit. Investing in selecting the right policies, controls and solutions leads to more successful audits and security that is more reliable.

Tags : security controls, risk compliance, it auditor, security, it management, best practices, business activity monitoring, risk management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.