Skip to content
 

risk management

Results 276 - 300 of 640Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility
    
Okta
Published By: Western Union Business Solutions     Published Date: Jan 01, 2001
Learn currency risk management strategies that can help your business survive and thrive in China and other international markets. This 45 minute Webinar is a must-see if you are business leader whose organization is impacted by China's economy.
Tags : 
foreign exchange, risk management, china, international markets, chinese economy, international, global, business, economies, western union
    
Western Union Business Solutions
Published By: Kaseya     Published Date: Mar 12, 2015
Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.
Tags : 
automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations
    
Kaseya
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework
    
RSA
Published By: Wyng     Published Date: Jan 13, 2016
The explosion of User Generated Content, or UGC, has drastically shifted the way people interact with brands. And as brands turn to UGC in place of their brand produced content, there are new risks that come with the rewards. To help mitigate these potential legal issues, we have developed a guide with everything you need to know about rights management.
Tags : 
search marketing, email marketing, website development, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce, traditional marketing, sales
    
Wyng
Published By: Rsam     Published Date: Apr 28, 2016
Healthcare enterprises are under more scrutiny than ever to demonstrate compliance. With more than 5,000 suppliers, this FORTUNE 50 company needed to automate and streamline their vendor risk management program. Learn why they selected Rsam and the results of their successful implementation.
Tags : 
rsam, fortune 500, vendor risk management, healthcare enterprise, compliance
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Enterprises are intensely focused on Vendor Risk today and with good reason.
Tags : 
rsam, vendor risk management, enterprise, risk assessment
    
Rsam
Published By: Rsam     Published Date: Apr 28, 2016
Join Rsam and Tom Garrubba, the Senior Director of Shared Assessments, as they discuss how to develop a game plan for vendor risk that aligns with OCC 2013-29.
Tags : 
rsam, occ, vendor risk, risk management
    
Rsam
Published By: Delta Risk     Published Date: Jun 07, 2016
Recent high profile, high impact cyber breaches at some of the largest financial institutions in the United States have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This Viewpoint offers the Delta Risk perspective on how boards should engage in the management of cyber security risks, stressing four priority activities.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: KPMG     Published Date: Nov 07, 2016
Seemingly unrelated events can conspire to harm your business when you rely on far-flung networks of suppliers, vendors, and service providers. Read “The Butterfly Effect” to learn how global organizations can address the threat of third party disruption in today’s economy.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends
    
KPMG
Published By: KPMG     Published Date: Nov 07, 2016
Can a better demand-driven supply chain positively impact the bottom line? The future belongs to the new customer. Customer experience is becoming undeniably more important, yet many companies lack responsive and agile supply chains that can continually adjust to fluctuating customer requirements. Read more.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends
    
KPMG
Published By: KPMG     Published Date: Nov 07, 2016
Manufacturers are gunning for growth and plan to put significant investment into R&D and new markets in order to achieve their ambitions. But without overall market growth, competition will be fierce. Read more.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends
    
KPMG
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Interactive Intelligence     Published Date: Jan 10, 2011
Contact centers face a tall order: Deliver stellar service and real-time response to customers, and still get more out of the workforce without risking burnout and turnover. Lori Bocklund is president of Strategic Contact, and Rachel Wentink is the senior director of Product Management for Interactive Intelligence, and when they discuss how to optimize agent performance and offer outstanding service, it's worth reading.
Tags : 
interactive intelligence, strategic contact, quality monitoring, wfm, workforce maangement
    
Interactive Intelligence
Published By: Trend Micro SPN     Published Date: Jun 15, 2009
Power to the people? Managing technology democracy in the Workplace. A Trend Micro sponsored report by the Economist Intelligence Unit.
Tags : 
trend, trend micro, economist intelligence unit, security, risks, technology democracy, cio, cto, team, human resources management, eiu, technology director, risks
    
Trend Micro SPN
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management, data protection
    
Mimecast
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models, cat, centroid, collective catastrophe, multilingual data, risk exposure
    
Trillium Software
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
Get the critical information you need to transform your data center by implementing a solution based on the greatest possible computing power with the lowest possible energy expenditure.
Tags : 
energy efficiency, mainline information systems, infrastructure, risk management, thermal performance, environment improvements
    
Mainline Information Systems
Published By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : 
navisite, technology, cloud comptuing, security, risk management, security management, business security
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: IBM     Published Date: May 12, 2008
Challenges like competitive pressures, compliance activities and higher operational costs make service management more critical than ever. To keep up, IT operations must constantly improve visibility, control and automation while bridging the gaps among business, development and daily operations.
Tags : 
itil, service management, governance, risk management, ibm, ibm g&rm, ibm grm
    
IBM
Published By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : 
ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities, information on demand framework, ibm db2 warehouse, ibm master data management server, ibm omnifind, ibm industry data models, ibm balanced warehouses, oltp-based transactional data
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : 
ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
With ever-increasing data growth worldwide, organizations must find smarter ways to store and manage their massive volumes of data. Learn how IBM® Tivoli® Storage Management software solutions help to maximize your current storage environment and reduce operational and capital costs while improving service and managing risks.
Tags : 
storage management, ibm, ibmtivoli, fastback, san, data growth, recovery management, reducing costs, improving service, managing risks, dynamic storage, infrastructure, virtualization, resource management
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : 
ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.