Skip to main content
 

risk tolerance

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
Published By: Russell Investments     Published Date: Mar 24, 2016
For a non-profit enterprise seeking to design effective investment portfolios for its asset pools, understanding the role of each of those asset pools is a crucial first step. The organization's goals and exposures can impact all parts of its portfolio construction process, from initial broad decisions on risk tolerance to more targeted decisions on asset-class exposures and investment vehicle preferences.
Tags : 
    
Russell Investments
Published By: MobileIron     Published Date: Feb 17, 2015
This eBook is designed to help your organization anticipate, understand and manage these and other questions regarding BYOD in the enterprise. In this four-part guide, we’ll look at best practices for preparing, building, rolling out and sustaining a successful BYOD program over the long term.
Tags : 
byod, pc sales, mobileiron, risk tolerance
    
MobileIron
Published By: SAP     Published Date: Jun 30, 2011
This paper aims to discuss the various capability acquisition and it solution deployment options and provide a perspective on how to evaluate the suitability of those options, given an enterprise's situation, and to get the best outcome.
Tags : 
sap, competitive positioning, solution landscape, risk tolerance, shared service center, bpo, bpu, application performance, scalability
    
SAP
Published By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : 
security, data security, networks, branding, attacks, security, security breach, safeguarding, infastructure, risk, risk tolerance, security attacks
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.
Tags : 
attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm, risk tolerance
    
IBM
Published By: Avetta     Published Date: Nov 14, 2016
EHS leaders across the globe know that it’s not enough to only manage the safety culture of their own organization; they are also responsible for the actions of the suppliers and contractors their organization hires. Each contractor brings their own set of cultural tendencies, including its level of risk tolerance and risky behavior. • Moments that Matter: A personal story by published author, Tom Wilson, who was involved in a horrific workplace accident which speaks directly to recognizing the factors that lead to risk tolerance. • The Role of Corporate Leadership in Risk Tolerance: Avetta co-founder Jared Smith shares four approaches your company can take to assess risk tolerance internally and how to measure and contain it within your contractor and supplier network. Explore your corporate culture’s effects on workplace accidents in the following two-part discussion. Download today
Tags : 
    
Avetta
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands
    
IBM
Search      

Add Research

Get your company's research in the hands of targeted business professionals.