Skip to main content
 

it risk management

Results 176 - 200 of 491Sort Results By: Published Date | Title | Company Name
Published By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, change management, configuration management, solidcore, fortrex, infrastructure, risk management
    
Solidcore
Published By: HP - Enterprise     Published Date: Jan 24, 2013
The trend toward consumerization in IT has strained the processes and governance put in place to ensure application security. It takes proven best practices to mitigate risk and embrace mobility without trepidation.
Tags : 
mobile, vulnerability, byod, dast, sast, testing, risk management, security management
    
HP - Enterprise
Published By: SAP Inc.     Published Date: Jul 28, 2009
Need to optimize your risk management program? Strategic risk management is crucial because of increased regulatory pressures, stakeholder pressures, the impact on capital costs, the personal effect of corporate risk, and the effect of the Internet of quickening the pace of dealing with risk factors.
Tags : 
risk, sap, risk intelligence, competitive advantage, strategic risk, risk management, deloitte, rewarded risk, value, creation, value protection, regulatory pressures, enterprise risk management, erm, business intelligence, stress-test, crisis response
    
SAP Inc.
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management
    
Tripwire
Published By: Intralinks     Published Date: May 29, 2013
Ensuring the security of confidential, sensitive information is an essential element of enterprise Security and Governance, Risk Management and Compliance programs. Regulations, such as the HIPAA, FDA, and SOX, place significant requirements on organizations for securely sharing sensitive data such as confidential personally identifiable information (PII) and personal health information (PHI).
Tags : 
security, sensitive information, sharing, mobile file sharing, solutions, confidential
    
Intralinks
Published By: Pega     Published Date: Sep 11, 2015
Download thsi white paper to learn how financial institutions can implement full end-to-end compliance and risk management through Pega BPM: -Transforming compliance from burden to benefit -Ensuring KYC, Suitability and Affordability compliance -Managing and measuring complaints to resolution -Providing governance, control and transparency around new products -Agility to extend to new risks and regulatory requirements -One common platform with specialized rules by regulatory requirement, geography and risk type
Tags : 
    
Pega
Published By: Okta     Published Date: Nov 09, 2015
This Forrester report outlines the future IT environment for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. Read this report to learn more.
Tags : 
okta, forrester, identity and access management, it environment, security and risk
    
Okta
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy, risk, management
    
Flexera
Published By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
    
Kronos
Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
    
Tenable
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Safety is a top priority for companies with a fleet of drivers and vehicles. It starts with hiring and screening new employees with safe driving records and qualifications. You may even have written safety policies. However, having visibility into your driver’s whereabouts and their behaviors behind the wheel is key in identifying and preventing risks before it costs your business. Do you wish that you could sit in the passenger seat of every vehicle in your fleet to watch driver behavior? With data-driven fleet safety management software from Silent Passenger you can. According to NHTSA, the cause of 94% of collisions is driver error. By monitoring unsafe driver behaviors such as speeding, hard braking, and fast acceleration is key to preserving fleet safety. A reliable fleet safety management software delivers key business intelligence that helps maintain fleet efficiency and productivity on the road. Improve Safety and Reduce Operational Costs Running a safer fleet can have a signif
Tags : 
    
Vehicle Tracking Solutions
Published By: BMC ASEAN     Published Date: Dec 18, 2018
From the impact of disruptive technologies to the imperative of digital transformation, businesses today must find new ways to innovate or risk being left behind. While data flowing rapidly between the Internet of Things and multi-cloud computing environments brings tremendous opportunity, there’s also a great deal of complexity. Artificial intelligence (AI) and machine learning (ML) are part of the new wave of solutions capturing the minds of enterprise leaders to respond to these new opportunities and complexities. Digitally literate leaders who are highly cognizant of this wave, are jumping in headfirst and applying AI and ML to solve real business challenges—making enterprise goals of enabling cost savings via smarter operations and decision making come to fruition. BMC Cognitive Service Management (CSM) addresses the complexities of multi-cloud computing by applying intelligence, automation, and predictive capabilities. CSM employs a differentiated approach with a more holistic
Tags : 
    
BMC ASEAN
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Firehost     Published Date: Jan 07, 2015
This Webinar covers all of the details you will need to know about PCI DSS 3.0.
Tags : 
pci dss 3.0, data security program, risk management practices, pci
    
Firehost
Published By: VMware     Published Date: Feb 26, 2009
VMware Virtual Infrastructure and CA Recovery Management (CA ARCserve Backup and CA Xosoft products) team up to deliver higher availability and risk-resistance for business-critical information and applications, while lowering management and operational costs and complexity.
Tags : 
vmware, it infrastructure, virtual infrastructure, ca recovery management, business critical information, business continuity, disaster recovery, high availability, operational costs, virtual infrastructure, multi-processor support, virtual machines, disk-to-disk-to-tape, multiple operating systems, value-enhancing services
    
VMware
Published By: PC Mall     Published Date: Mar 21, 2011
For some companies, even a few hours of downtime can become a business disaster. IT risks must be considered as serious as any other significant business risk. When was the last time you assessed your business risks? Download this HP white paper to learn how to reduce the financial impact and maintain acceptable levels of productivity during an unplanned disaster.
Tags : 
disaster recovery, it risks, business continuity, outage, risk management
    
PC Mall
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats
    
Skillsoft
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: Attachmate     Published Date: Mar 20, 2013
Traditional fraud detection methods, such as application logging, can’t address the scale and sophistication of today’s threats. Find out how to get the visibility you need to better and manage enterprise risk with Luminet.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit
    
Attachmate
Published By: Attachmate     Published Date: Mar 20, 2013
Insider threats continue to challenge organizations, particularly as BYOD brings complexity to enterprise risk management. The latest Ponemon research highlights recent trends, risk factors and what organizations need to do now to reduce risk.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit
    
Attachmate
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.