managing risk

Results 101 - 125 of 144Sort Results By: Published Date | Title | Company Name

Sales Tax Compliance and The CFO: What Automation Means for Risk Management

Published By: Avalara     Published Date: Jan 28, 2014
Sales tax compliance and the CFO: What automation means for risk management conveys why it’s time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate. This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance — and, more importantly — what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, business technology
    
Avalara

Cloudy with a chance of mishap

Published By: IBM     Published Date: Jan 08, 2016
This executive report identifies opportunities for insurance companies to use weather data as an important asset in both managing operational and financial risks, as well as improving customer relationships.
Tags : 
ibm, insurance, financial risk, customer relationships
    
IBM

Pushing the frontiers - CFO insights from the Global C-suite Study 2013

Published By: IBM     Published Date: Jul 30, 2014
In this new CFO point of view report, we focus on the perspectives of the 576 CFOs we interviewed.
Tags : 
ibm, business analytics, business insights, cfo, cfo insights, managing risk, financial management
    
IBM

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges, security, it management, data protection, database security, business technology
    
IBM

Beyond the Next Generation: Meeting the Converging Demands of Network Security

Published By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : 
data security, ibm, risk management, network security, security threat, networking, security, it management, knowledge management, data management
    
IBM

Beyond the Next Generation: Putting Advanced Network Security To Work

Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking, security, it management, knowledge management, data management
    
IBM

Managing Security Risks and Vulnerabilities

Published By: IBM     Published Date: Apr 09, 2015
Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.
Tags : 
ibm, integrated security, security weakness, risk management, infrastructure security, application security, firewalls, network security appliance, security policies, pci compliance, vulnerability management
    
IBM

Strengthen Security With Intelligent Identity and Access Management

Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks, networking, security, it management, knowledge management, data management
    
IBM

Aligning IT With Strategic Business Goals- A Proactive Approach To Managing IT Risk To Your Business

Published By: IBM     Published Date: Oct 06, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, it dependence, managing it risk, ibm solutions, security, it management, business technology
    
IBM

Advantage Cloud: The clear path to modernizing B2B integration

Published By: IBM     Published Date: Apr 21, 2016
"Reshaping trading partner communities with growth, agility and scalability View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM B2B Cloud Services cite, including: - Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners"
Tags : 
ibm, b2b, cloud, b2b integration, cloud computing
    
IBM

Trends in SAP Cybersecurity: Uncovering the Risks of SAP Cyber Breaches by Ponemon Institute

Published By: IBM     Published Date: Sep 30, 2016
Uncovering the Risks of SAP Cyber Breaches by Ponemon Institute How are organizations truly managing cybersecurity risks in their SAP ecosystem? Ponemon Institute’s latest study of 607 global IT security practitioners reveals senior level perceptions about SAP, its security challenges, and the risk of data breaches and cyberattacks.
Tags : 
ibm, security, ponemon institute, technology, fraud, sap, cyber breaches, knowledge management, enterprise applications, business technology
    
IBM

Advantage cloud: The clear path to modernizing B2B integration

Published By: IBM     Published Date: Oct 11, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM Sterling B2B Cloud Services cite, including: -Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners
Tags : 
ibm, commerce, b2b, b2b integration, cloud, advantage cloud, networking, knowledge management, enterprise applications, business technology
    
IBM

Uncovering the Risk of SAP Cyber Breaches

Published By: IBM     Published Date: Jul 26, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. The companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months.
Tags : 
cyber breach, data security, information theft, security risk, risk management
    
IBM

Managing Fraud Risk in the Digital Age

Published By: SAS     Published Date: Oct 03, 2018
Risks have intensified as retailers and financial organizations embrace new technologies to meet customer demands for convenience. The rise of mobile and online transactions introduces new risks – and with that, new requirements for fraud mitigation. This paper discusses key steps for fighting back against fraud risk by establishing appropriate and accurate data, analytics and alert management.
Tags : 
    
SAS

Has Anyone Ever Returned an Unused Software License?

Published By: IBM     Published Date: May 09, 2013
While software license costs are a major expense, most companies spend very little time managing this critical and widely distributed asset until an audit occurs or a cost reduction program forces attention. This should be the year you flip from being reactive to being proactive in dealing with software asset and license management. Costs savings and peace of mind are just two of the benefits that you will realize. In this Webcast an analyst from Frost and Sullivan will go over the results of a recently published white paper on this topic and Deloitte & Touche will discuss the benefits their customers have gained in automating their license management processes. View this Webcast to learn how you can reclaim licenses, avoid unnecessary license costs, achieve continuous compliance, and improve risk management.
Tags : 
software license, automate, reclaim licenses, compliance, improve, risk management
    
IBM

The Risks of "Do It Yourself" Disaster Recovery

Published By: IBM     Published Date: Oct 10, 2013
Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster recovery strategy successful, and the key questions you need to ask before bringing disaster recovery in-house.
Tags : 
disaster recovery, do it yourself, ibm, forrester, recovery speed, disaster recovery management, disaster recovery management, backup and recovery, data protection, database security, business technology, infrastructure management
    
IBM

The digital claims imperative

Published By: DocuSign     Published Date: Jul 12, 2019
Rising consumer expectations are shaping the future of insurance industry, and transforming the claims process is pivotal to improving the customer journey. As carriers vie to retain their clients and capture new ones, they are turning to digital technologies to streamline their claims procedures—reducing their costs and better managing their risks along the way. We walk through how digital technologies can help insurers provide a convenient, multichannel and truly satisfying customer experience.
Tags : 
    
DocuSign

Improve Visibility and Threat Detection with Security Intelligence and Big Data

Published By: IBM     Published Date: Jul 09, 2014
Most organizations are managing data sets that are larger than ever before, where many security offenses can be hidden and undetected, posing severe risks to business operations and the protection of sensitive, private information. Watch this video and learn how these exposures can be addressed with IBM's integrated Security Intelligence and Big Data solution.
Tags : 
ibm, security, cyber security, security intelligence, big data, visibility, threat detection
    
IBM

Three Shortcuts for UC Success

Published By: Viavi Solutions     Published Date: Oct 11, 2013
Managing UC means delivering streaming video fluidly, transmitting voice with clarity, moving IM's briskly, and send emails promptly. Easier said than done. To succeed from setup to show time, take these three tips to achieve the high performance end-users expect.
Tags : 
us applications, shortcuts to success, uc success, network instruments, achieve high performance, end-users, user expectations, network environment, qos, application and network management, optimize performance, critical applications, networking, it management, wireless application software, application performance management
    
Viavi Solutions

Eliminating the Challenge of Branch Office Recovery

Published By: Riverbed     Published Date: Sep 05, 2014
Nobody can afford to lose data. But managing the backup and recovery of data and services in far-flung locations can present many logistical and technology challenges that add complexity, expense, and risk. A new branch converged infrastructure approach allows IT to project virtual servers and data to the edge, providing for local access and performance while data is actually stored in centralized data centers. IT can now protect data centrally and restore branch operations in a matter of minutes versus days.
Tags : 
branch office, data services, data recovery, centralized data centers, it management
    
Riverbed

Make Storage Stress - free

Published By: HP     Published Date: Aug 26, 2014
HP Simply StoreIT takes the stress out of storage. HP and our network of over 200,000 channel partners worldwide can help you choose the right solutions to fit your biggest business challenges. We can help you overcome obstacles including too little time for managing IT, budgets for upgrading infrastructure, and too many business risks and threats. Now you can take charge of virtualization, storage for business solutions such as Exchange and SQL Server, growing file shares, and data protection for business continuity. Improve your operational efficiency, reduce your risks, and lower storage costs. See how.
Tags : 
storage, budgets, server, virtualization, file, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork
    
HP

How to Simplify SSL Certificate Management

Published By: Symantec Corporation     Published Date: Oct 08, 2014
"SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services. The risks of hiccups and problems increases with the number of certificates, including lost sales when customers see security warnings about expired certificates on your site, damage to your brand and consumer trust because of problems with certificates and more. With these risks in mind, this guide provides five simple steps for IT professionals to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle."
Tags : 
ssl
    
Symantec Corporation

Definitive Guide To Third Party Risk Management

Published By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : 
third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
    
NAVEX Global

The Value of Integrating Health, Safety & Environment Processes with Enterprise Asset Management

Published By: IBM     Published Date: Jan 09, 2015
Learn more about the importance of managing physical assets in asset-intensive industries in the context of safety management, risk management, compliance management, corporate social responsibility and sustainability for the benefit of future generations.
Tags : 
environment processes, enterprise asset management, asset-intensive industries, compliance managment, it management, knowledge management, enterprise applications, data management
    
IBM

Mitigating Risk Using Power Management System

Published By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.