risk management

Results 351 - 375 of 682Sort Results By: Published Date | Title | Company Name

Seven Reasons You Need Predictive Analytics Today

Published By: IBM Software     Published Date: Nov 04, 2010
Learning from the past is one thing, but when real competitive advantage happens you get it right the first time.
Tags : 
ibm cognos, predictive analytics, enterprise data, risk management, business analytics, enterprise software, analytical applications, database development
    
IBM Software

Predictive Threat and Risk Management: Meeting the Challenges of a Smarter Planet

Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection, access control, identity management, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
IBM Software

Leveraging data for internal and external threat detection

Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management, access control, identity management, intrusion detection, intrusion prevention, security management, security policies
    
IBM Software

Using Data Mining to Detect Insurance Fraud

Published By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
ibm, security, identity management, insurance fraud, data protection, risk management, access control, application security, authentication, intrusion detection, intrusion prevention
    
IBM Software

Improving Claims Management Outcomes with Predictive Analytics

Published By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
ibm, security, predictive analytics, security policy, risk management, internet security, security solutions, access control, application security, authentication, identity management, security management, security policies, vulnerability management
    
IBM Software

Predictive Threat and Risk Management: Meeting the Challenges of a Smarter Planet

Published By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software

Securing Web Applications Across the Software Development Lifecycle

Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing, application security, security management, product lifecycle management, software testing, web development, web service security
    
IBM Software

3 Ways To Reduce Third-Party Application Risk and Strategies to Protect Endpoints

Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management, anti spam, anti spyware, application security, windows server, data protection
    
Lumension

Virtualization Security Risks: How to Develop Your Strategic Approach Now

Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, virtualization
    
Lumension

Virtualization Reduces Costs and Complexity for Mid-sized Businesses

Published By: IBM Corp     Published Date: May 31, 2011
This paper explains virtualization, its benefits for mid-sized business and how IBM's virtualization strategy can help mid-sized companies reduce costs, improve services and simplify management.
Tags : 
ibm virtualization, mid-sized businesses, ibm solutions, virtualized infrastructure, system x, bladecenter hs22v, vmware, tco, energy efficiency, risk management, smb, infrastructure, servers, blade servers, return on investment, server virtualization, total cost of ownership, power and cooling, virtualization
    
IBM Corp

Improving claims management outcomes with predictive analytics

Published By: IBM     Published Date: Aug 07, 2012
As a claims management professional, you have to deal daily with formidable - and sometimes competing - challenges: provide superior customer experience; achieve operational excellence and cost containment; and effectively manage risk. Predictive analytics can help you improve each of these three outcomes, but more importantly, it helps strike the right balance among these three objectives for each new claim received. Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
improving, claims, management, outcomes, predictive, analytics, claims, management, professional, formidable, competing, superior, customer, experience, operational, excellence, cost, containment, risk, predictive
    
IBM

A Comparison of PowerVM and x86-Based Virtualization Performance

Published By: IBM     Published Date: Oct 01, 2012
his independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
virtualization, it infrastructure, software partitioning, reduce costs, risk management, server virtualization, business technology
    
IBM

Virtualization reduces costs and complexity for mid-sized businesses, April 2011, IBM

Published By: IBM     Published Date: Oct 01, 2012
The paper explains virtualization in the context of mid-sized businesses and shows how they can reduce costs, improve services and simplify management.
Tags : 
virtualization, dynamic infrastructure, ibm, risk management, system management, server virtualization, business technology
    
IBM

Capitalizing on the Software Asset Management Imperative

Published By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : 
software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction, ibm tivoli, business alignment, it infrastructure library, itil, it strategy, it planning, software licences, analytics, audit preparedness, virtualization, cloud, saas
    
IBM

Managing Financial Performance: Integrated, Enterprise-Wide Performance and Risk Management

Published By: SAP     Published Date: Jul 17, 2012
High performers are quick to detect and respond to subtle changes in their markets, absorb external pressures without undue disruption, and consistently achieve superior results. among these leading organizations is an increasing recognition of the value of using unified enterprise performance management solutions to measure, manage, and monitor their financial and nonfinancial performance.
Tags : 
sap, business, managing, finances, performance, performance management, best practices, business technology, research
    
SAP

Manage the Mobile Madness

Published By: CDW     Published Date: Jun 30, 2015
See why CDW has the expertise to design and deliver the best enterprise mobility management (EMM) solution for how your business handles the mobile device hoopla.
Tags : 
mobility, apps, strategy, platform, emm, risk management, productivity, monitoring, application integration, application performance management, best practices, mobile device management
    
CDW

Complimentary VMware® vSphere® Optimization Assessment

Published By: CDW     Published Date: Aug 07, 2015
How you benefit from VMware vSphere with Operations Management
Tags : 
data center, storage, cloud, risk management, data center design and management, virtualization, cloud computing
    
CDW

Avoiding the Seven Deadly Sins of IT Security

Published By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection, compliance, data security, business continuity, anti virus, anti spam, malware, endpoint security, risk management
    
Kaseya

Checklist: Assessing 3rd Party Risk Management Solutions

Published By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global

Social Media Toolkit: 4 Keys to Managing Employee Social Media Usage

Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global

A Prescriptive Guide to: Third Party Risk Management

Published By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment, qualified third parties, qualifications, risk mitigation, monitoring and auditing, policy based management, security management, security policies, best practices
    
NAVEX Global

Involve the Business in your Telecoms and Mobility Sourcing Road Map

Published By: RingCentral     Published Date: May 22, 2014
As a purchasing executive or vendor management professional, your goal is to balance business value, cost and associated risks when sourcing and managing technology vendors. Download this whitepaper and learn: • To identify internal drivers that shape sourcing strategies • Best practices for developing a new T&M sourcing strategy • 5 key sourcing and vendor management activities that strengthen your sourcing strategy
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes, enterprise applications, data center
    
RingCentral

Mobility Management: How to Address Management Challenges in a Modern Mobile Landscape

Published By: Enterprise Mobile     Published Date: Dec 08, 2014
Download this solution brief and learn how to address management challenges while reaping the rewards that mobility has to offer.
Tags : 
enterprise mobile, mobility management, management strategy, risk management, mobility, enterprise applications, application risk management, enterprise mobility management, it management, knowledge management, mobile computing
    
Enterprise Mobile
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.