risk tolerance

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name

Forrester – Gauge Your Cloud Maturity

Published By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
    
VMware

The Ultimate Guide to BYOD

Published By: MobileIron     Published Date: Feb 17, 2015
This eBook is designed to help your organization anticipate, understand and manage these and other questions regarding BYOD in the enterprise. In this four-part guide, we’ll look at best practices for preparing, building, rolling out and sustaining a successful BYOD program over the long term.
Tags : 
byod, pc sales, mobileiron, risk tolerance
    
MobileIron

Building Capabilities Leveraging Alternate Solution Deployments

Published By: SAP     Published Date: Jun 30, 2011
This paper aims to discuss the various capability acquisition and it solution deployment options and provide a perspective on how to evaluate the suitability of those options, given an enterprise's situation, and to get the best outcome.
Tags : 
sap, competitive positioning, solution landscape, risk tolerance, shared service center, bpo, bpu, application performance
    
SAP

Responding to - and recovering from - sophisticated attacks

Published By: IBM     Published Date: Oct 10, 2013
We all know how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly. But what can you do about it? The IBM white paper “Responding to—and recovering from—sophisticated security attacks” details four proactive steps that you can—and should—take now to help keep your organization safe: prioritize your business objectives and set your risk tolerance; protect your organization with a proactive security plan; prepare your response to the inevitable sophisticated attack and promote and support a culture of security awareness. Read the white paper to learn how to help keep your organization safe from sophisticated security attacks and find out how IBM can help.
Tags : 
security, data security, networks, branding, attacks, security, security breach, safeguarding
    
IBM

Sophisticated Attacks

Published By: IBM     Published Date: Feb 27, 2014
Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.
Tags : 
attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
IBM

Responding To - And Recovering From - Sophisticated Security Attacks

Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection
    
IBM

2018 Gartner Magic Quadrant for Enterprise Network Firewalls

Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Visionary for 2nd year in a row, in the Gartner 2018 Magic Quadrant for NGFW Gartner has named Forcepoint sole Visionary in their 2018 Magic Quadrant for NGFW, for ability to execute and completeness of vision. According to Gartner, “In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.”*
Tags : 
    
Forcepoint
Search      

Add Research

Get your company's research in the hands of targeted business professionals.