Skip to main content
 

it risk management

Results 101 - 125 of 454Sort Results By: Published Date | Title | Company Name
Published By: NAVEX Global     Published Date: Jul 17, 2017
Thirty percent of organisations expect to do more work through outside third parties in 2017. However, third parties are responsible for 75 percent of foreign bribery schemes, making these engagements rife with risks that can’t be ignored. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with outside business partners. The Definitive Guide to Third-Party Risk Management gives you insight, advice and examples to help your organisation recognise and address third-party risk.
Tags : 
assessments, workflow, overseer, documentation, organisation, writing, review, feedback, updates, security
    
NAVEX Global
Published By: Forcepoint     Published Date: Aug 31, 2018
Eine Firma ist nur so handlungsfähig wie ihr Netzwerk. Änderungen an der Netzwerkarchitektur sind daher riskant. Verbesserungen an der Sicherheit eines IT-Netzwerkes bedeuten oft schlechtere Netzwerk-Performance und umgekehrt. Vor allem, wenn Netzwerke nicht konsistent sind und dadurch der Verwaltungsaufwand sehr hoch ist, sollte man über eine Neuplanung nachdenken. „Modernizing the Distributed Enterprise Network“ untersucht wie die Forcepoint NGFW neue Standards setzt und somit die Digitale Transformation in Unternehmen voranbringt. Enterprise-grade SD-WAN connectivity. Implementieren und Verwalten von Unternehmensnetzwerken mit mehr als 1000 Standorten zentral von einer Konsole. Höchste Sicherheit ohne Einbußen bei der Performance und Zuverlässigkeit. Einfachste Implementierung und Verwaltung mit zentralem Management im Unternehmen. Zukunftssicher, agil und flexibel. Passt sich unterschiedlichen Anforderungen und Situationen an. Lesen Sie „Modernizing the Distributed Enterpri
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Jul 08, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: CA WA     Published Date: Aug 15, 2008
One of the most dramatic innovations in the infrastructure management marketplace in the last five years is the rise of Network Change and Configuration Management (NCCM) as a strategic requirement. This white paper will focus on the strong values that NCCM can bring to reliability, risk and cost management, as well as some of its powerful operational and lifecycle asset values. This report will also introduce the CA SPECTRUM Network Configuration Manager as a distinctive leadership offering.
Tags : 
configuration management, configuration, change management, change, network management, ca wa, computer associates, workload automation
    
CA WA
Published By: EMC Corporation     Published Date: May 27, 2014
ESG Whitepaper: New security risks and old security challenges often overwhelm legacy security controls and analytical tools. This ESG white paper discusses why today's approach to security management—that depends on up-to-the-minute situational awareness and real-time security intelligence—means organizations are entering the era of big data security analytics.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: SailPoint     Published Date: Feb 08, 2011
This guide is designed to help ensure a successful identity governance strategy can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Tags : 
sailpoint, identity governance, compliance, risk management, access management, password management, reporting and analytics
    
SailPoint
Published By: Citrix Systems     Published Date: Sep 17, 2015
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : 
information security, mobility, risk management, consumerization
    
Citrix Systems
Published By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : 
ibm, technology, risk management, professionals, business, security management, emerging threats
    
IBM
Published By: IBM     Published Date: Jul 13, 2012
Learn how respondents, including nearly 400 senior executives from some of the world's largest enterprises, are incorporating holistic business resilience planning into their businesses through top-level findings and case studies. Download the research report here.
Tags : 
ibm, technology, risk management, global technology, technology, risk study
    
IBM
Published By: IBM     Published Date: Oct 09, 2012
This whitepaper contains a study that investigates how organizations around the world are managing their reputations in today's digital era, where IT is an integral part of the organization and IT failures can result in reputational damage.
Tags : 
it risk management, security, it threats, corporate reputations
    
IBM
Published By: NAVEX Global     Published Date: Jul 02, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions now business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
diligence systems, risk management solutions, integrated due diligence, compliance
    
NAVEX Global
Published By: Red Hat     Published Date: Jul 17, 2014
As a strategic partner in your business, you need to respond to growing business demand. Unfortunately, you face several challenges. Your complex IT environment is costly to manage and has a high downtime risk. Most of your resources and budget likely go to maintaining the stability, security and reliability of your IT system. Your organization might lack the processes needed to confidently manage support issues, IT transitions and new application deployments. In this whitepaper you will read about how to maximize uptime, reduce management costs, and quickly respond to business demands.
Tags : 
business demand, security, it transitions, new applications, it systems, efficiency, maximize uptime, manage costs
    
Red Hat
Published By: Delphix     Published Date: May 28, 2015
"Security-conscious organizations face a gap between current requirements and capabilities as they relate to data masking. Data volumes are growing exponentially and the risk of data leaks continues to make news, yet many organizations rely on inefficient, legacy approaches to protecting sensitive data. In contrast, top performing companies are turning to virtual databases and service-based masking solutions to ensure that data management functions can keep up with software development.
Tags : 
    
Delphix
Published By: Delphix     Published Date: May 28, 2015
A new generation of tools is bringing agility to components of IT operations . Learn how recent advancements in agile data management, data virtualization, and data masking are combining to help companies achieve previously unachievable breakthroughs in IT security and risk management. Starting with a technical dive into data masking and the key concepts surrounding “virtual data”, this eBook also leverages exhaustive industry research and company surveys to translate the business value associated with these solutions.
Tags : 
    
Delphix
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: MarkLogic     Published Date: Jun 21, 2017
Global financial organizations are facing increasing demands from the business for more granularity, transparency, reporting and security. If you’re on the IT side, you know this adds a different set of ‘mores’ to the equation: More duplication, delays, and people. What’s the net-net? More cost and more risk. You can balance the scales to satisfy those demands. And it starts with thinking differently about data management. Our financial services technology experts will explore the implications of governance, risk and compliance (GRC) imperatives. You’ll learn: • Why data is at the heart of an effective and dynamic GRC strategy • Why technological capabilities used to enable standard GRC programs can reduce transparency and prevent you from gaining a holistic view of your data • A new approach to data can provide the business with complete transparency • Review a sample regulatory reporting architecture Stop burning time on tooling — and start building a dynamic GRC strategy that can
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: BitSight Technologies     Published Date: Feb 20, 2015
Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management
    
BitSight Technologies
Published By: MobileIron     Published Date: Apr 11, 2018
The enterprise landscape has changed dramatically with the influx of millennials — and their preferred devices — into the workforce. As a result, Macs that were once limited to mostly niche usage are now rapidly expanding their enterprise footprint. These devices require the same level of security and oversight that organizations apply to all of their other devices. Otherwise, the risk of leaving Macs either unmanaged or secured by point products creates security gaps that can leave the enterprise open to cyberattacks and compliance violations. The good news is, MobileIron makes it easy to secure Macs the same way all other devices in the enterprise are managed. No integrations, additional training, or learning curves are involved. The time has come for a modern approach to Mac management that is seamless for end users, improves operational efficiency, and simplifies IT operations across the entire device lifecycle. MobileIron makes it all possible.
Tags : 
macos, modern, work, era, devices, workforce, organizations
    
MobileIron
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: ServiceNow     Published Date: Apr 12, 2017
Read The Total Economic Impact™ of ServiceNow, an April 2017 commissioned study conducted by Forrester Consulting on behalf of ServiceNow, to understand the benefits, costs, and risks associated with the following ServiceNow solutions: IT Service Management, IT Operations Management, and Performance Analytics. The study, commissioned by ServiceNow, covers key findings in these three categories: Modernizing IT Service Management Eliminating Service Outages Optimizing Performance with Real?time Analytics Forrester interviewed seven current ServiceNow customers with years of experience using the solutions identified above. The purpose of the study is to provide potential customers with a framework to evaluate the real world customer experience and economic impact of the Now platform on their organizations.
Tags : 
operations management, performance analytics, it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management, service, automation, productivity, infrastructure
    
ServiceNow
Published By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : 
ibm, analytics, ecm, digital business
    
IBM
Published By: Determine (Selectica)     Published Date: Oct 24, 2017
Organizations today and for the foreseeable future must have visibility into supplier and third-party operations in order to mitigate risks and achieve compliance.
Tags : 
    
Determine (Selectica)
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.