Skip to main content
 

it risk management

Results 326 - 350 of 491Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 01, 2012
This paper defines predictive analytics, then details ways this type of analytics can be applied to marketing, risk, operations and more. It also includes information relevant to a wide variety of industries - from manufacturing to hospitals.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Mar 20, 2012
The banking sector routinely manages massive amounts of data, ranging from financial transactions to customer, operational and regulatory data. All this data means big challenges - but also big opportunities - for the industry. Find out more now!
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management, personal finance, investing, small business, finance
    
SAS
Published By: Skillsoft     Published Date: Sep 30, 2013
This ExecBlueprint describes an integrated approach for managing performance, risk, and compliance through centralized governance processes. It is called “GRC” (governance, risk management, and compliance), and it provides a framework for sharing policies, processes, and documents at the enterprise level to improve communication, create organizational efficiencies, and reduce unnecessary risk.
Tags : 
    
Skillsoft
Published By: Bit9     Published Date: Mar 07, 2013
Download this whitepaper and learn the details of a changing threat landscape and the benefits you gain by building security on the basis of trust.
Tags : 
security, risk management, roi, cost reduction, enterprise, cyber threat
    
Bit9
Published By: Bit9     Published Date: Mar 07, 2013
Download Bit9’s latest Threat Advisor and see how a trust-based security platform can help you protect your core IP.
Tags : 
security, risk management, cyber threats, security breaches, cyber espionage, nsa, intellectual property
    
Bit9
Published By: Bit9     Published Date: Mar 07, 2013
Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.
Tags : 
security, risk management, roi, cost reduction, enterprise, cyber threat
    
Bit9
Published By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan
    
Singtel
Published By: IBM     Published Date: Jun 25, 2013
This new edition has a wider scope than the previous one, with 17 participants while retaining a similar maturity model as the previous one in order to help participants measure their progress year -on-year.
Tags : 
hpc, maturity, risk management, maturity model
    
IBM
Published By: IBM     Published Date: Jun 25, 2013
The global credit crunch that began in 2007 threw the financial industry into turmoil and highlighted the need for financial firms to improve their risk management practices. Today, the credit crisis is far from over. Markets remain volatile, and financial firms face waves of regulatory requirements intended to safeguard the solvency of individual firms and the stability of economies worldwide. These reforms will dramatically affect firms — burdening the profitability and growth of some, and the very survival of others.
Tags : 
risk management, financial industry, profitability, smarter risk management practices
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.
Tags : 
ibm, mastering risk, business forecasting, business analytics, ibm software, variation, predictable risk, discontinuities, unpredictable risk, active risk management, passive risk management, error analysis, long-term forecast error
    
IBM
Published By: Micro Focus     Published Date: Aug 28, 2014
Enabling technologies to streamline regulatory and legislative changes.
Tags : 
it compliance programs, risk management
    
Micro Focus
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: BitSight Technologies     Published Date: Jun 12, 2015
Gartner has named BitSight Technologies a “Cool Vendor” in Vendor Management for 2015. This report highlights three vendors for offering “tools and services to support vendor risk management and improve performance visibility.” Download this paper to learn how BitSight processes and synthesizes terabytes of data to create security ratings, and how a leading North American Bank uses BitSight Security Ratings in their vendor risk management program.
Tags : 
bitsight, technologies, gartner, cool, vendor, data, risk
    
BitSight Technologies
Published By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : 
vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards
    
BitSight Technologies
Published By: Tripwire     Published Date: Jul 05, 2007
Discover how high-performing IT organizations are able to create a culture that supports and uses change management to their advantage, facilitating enterprise business goals.
Tags : 
cmdb, configuration management, auditing, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire
    
Tripwire
Published By: Tripwire     Published Date: Jul 13, 2007
In this whitepaper, you will learn how configuration audit and control can be used effectively to ensure system management productivity, and help reduce costs and sustain configuration viability within the bounds of operational, security and regulatory standards.
Tags : 
change management models, auditing, configuration management, security, change management, network security, efficiency, productivity, tripwire, cmdb, risk management, audit, risk audit, risk control, configuration control, compliance, tripwire, change control
    
Tripwire
Published By: Tripwire     Published Date: Jan 30, 2008
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Tags : 
cmdb, change management, configuration management, risk management, compliance, idg, tripwire, lifecycle management
    
Tripwire
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation, security investment, risk, risk management, it security, cis benchmark, e-commerce security, gramm-leach-bliley act (glba), sarbanes-oxley act (sox), health insurance portability, accountability act (hipaa), windows server, sysadmin
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing
    
Tripwire
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft, cyber criminals, security, security risks, global analytics, visibility, data sets, protection, external threats, risk, risk management, finanical stability
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
First-generation security intelligence and security incident and event management products have promised a lot, but some of these tools require considerable resources to manage the solution. The growth in security-as-a-service offerings, however, offers an opportunity for information security teams to follow the path successfully laid by many other IT departments. Read this white paper, “Security intelligence can deliver value beyond expectations and needs to be prioritized” for an overview of market adoption of security-as-a-service.
Tags : 
security, security intelligence, security incident, event management, security-as-a-service, information security, risk, risk management
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : 
reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets, protection, safeguarding, outsourcing, risk management, data loss, data loss prevention, global it solutions
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.