risk management

Results 351 - 375 of 704Sort Results By: Published Date | Title | Company Name

Effective Asset Management in an Uncertain Economy

Published By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : 
ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization, product lifecycle management, productivity
    
IBM

Virtualization for midsize businesses: reduce cost, improve service and manage risk.

Published By: IBM     Published Date: Oct 14, 2009
This paper shows how mid-sized companies can benefit by implementing a virtualization strategy. Unique, industry-leading capabilities from IBM, Intel and VMware are highlighted.
Tags : 
virtualization, unique, roi, it infrastructure, servers, business continuity, system management, risk management, return on investment, server virtualization, system management software
    
IBM

Find the balance between data security and availability.

Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management, security management, risk management, tivoli, data protection, database security
    
IBM

See how supply chains are changing and how you can keep up.

Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Supply Chain Management 2010 and Beyond WP," you'll see how the role of the supply chain manager is shifting from tactical to strategic. And learn why successful supply chains must be strategic, dynamic and customer-driven.
Tags : 
supply chain, ibm, scm, customer driven, talent management, risk management, business process integration, business process management, supply chain management
    
IBM

Anticipate your supply chain. Learn how to avoid missteps and keep things running

Published By: IBM     Published Date: Oct 28, 2009
In the IBM white paper, "The Smarter Supply Chain of the Future: Global Chief Officer Supply Chain Study," you'll see how sensor technologies, new analytic capabilities and simulation techniques can predict, if not prevent, disruptions before they occur.
Tags : 
supply chain management, ibm, risk, management systems, connectivity, scm, network, network management, risk management, system management software
    
IBM

Making a case for problem solving in the energy and utilities industries

Published By: IBM     Published Date: Dec 07, 2010
Energy and utility companies need to manage incidents such as customer complaints or disputes to improve customer service while protecting the business should escalations occur. Advanced case management (ACM) provides enhanced service and risk management throughout the lifecycle of a case.
Tags : 
ibm, advanced case management podcast, acm, energy and utilities industries, customer service, risk management, business intelligence, content and process management, analytics, business rules, collaboration, utility computing, business process management, customer interaction service, customer relationship management, customer satisfaction, content management system
    
IBM

All Data Is Not Equal

Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies, vulnerability management
    
Stratus Technologies

Meeting the Challenges of Enterprise Roles-Based Access Governance

Published By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : 
access control, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa

Beyond the Checkbox: A Sustainable Approach to Access Certification

Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa, authentication, data protection
    
Aveksa

Managing Risk for Effective Access Governance

Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa, corporate governance
    
Aveksa

10 Common Misconceptions Businesses Have About Identity Proofing

Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology, authentication
    
IDology

10 things you really wished you had known about PDF Security, but they didn't tell you!

Published By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : 
pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions, adobe, affiliate scheme, footprint, risk management, risk, vulnerabilities, dmca, digital millennium copyright act, adobe reader, usability, encryption, security
    
LockLizard

Measuring The Value of IT Service Management, EMA Whitepaper

Published By: LANDesk     Published Date: Jan 12, 2009
The purpose of this paper is to present a method for reducing risk and increasing IT contribution during uncertain times and to assist readers with measuring the value and building a business case for IT Service Management (ITSM).
Tags : 
avocent, itsm, it service management, itil, it infrastructure library, green it, business management, maturity model, best practices, crm, customer relationship management, crm tools, sla, service management
    
LANDesk

Service Management Integration - Completing the Jigsaw

Published By: LANDesk     Published Date: Aug 26, 2009
Service management solutions have the potential to return very significant hard-currency ROI. Successful implementations dramatically improve decision accuracy, enhance productivity, increase operating efficiency and reduce operational risk by providing comprehensive context for a wide range of management decisions.
Tags : 
avocent, itsm, it service management, itil, integration, sla, it infrastructure library, green it, business management, maturity model, best practices, crm, customer relationship management, crm tools, sla, return on investment, web service management
    
LANDesk

For PCI, the Future is Now

Published By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing, business process automation, data protection, database security, pci compliance
    
Tripwire, Inc

Streamline your application portfolio to help cut costs, fund innovation and reduce risk

Published By: PC Mall     Published Date: Mar 27, 2012
IBM Rational software solutions can help you evaluate an application portfolio with the goal of retiring, modernizing and consolidating what could amount to hundreds of application.
Tags : 
application, application portfolio, cut costs, fund, innovation, risk, evalutate, evaluation, consolidation, consolidate, application, apm, application portfolio management, business, rational software, enterprise applications
    
PC Mall

Seven Reasons You Need Predictive Analytics Today

Published By: IBM Software     Published Date: Nov 04, 2010
Learning from the past is one thing, but when real competitive advantage happens you get it right the first time.
Tags : 
ibm cognos, predictive analytics, enterprise data, risk management, business analytics, enterprise software, analytical applications, database development
    
IBM Software

Predictive Threat and Risk Management: Meeting the Challenges of a Smarter Planet

Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection, access control, identity management, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
IBM Software

Leveraging data for internal and external threat detection

Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management, access control, identity management, intrusion detection, intrusion prevention, security management, security policies
    
IBM Software

Using Data Mining to Detect Insurance Fraud

Published By: IBM Software     Published Date: Feb 03, 2012
Read this paper to learn how to combine powerful analytical techniques with your existing fraud detection and prevention efforts and deploy results to the people who can use the information to eradicate fraud and recoup money.
Tags : 
ibm, security, identity management, insurance fraud, data protection, risk management, access control, application security, authentication, intrusion detection, intrusion prevention
    
IBM Software

Improving Claims Management Outcomes with Predictive Analytics

Published By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
ibm, security, predictive analytics, security policy, risk management, internet security, security solutions, access control, application security, authentication, identity management, security management, security policies, vulnerability management
    
IBM Software

Predictive Threat and Risk Management: Meeting the Challenges of a Smarter Planet

Published By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software

Securing Web Applications Across the Software Development Lifecycle

Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing, application security, security management, product lifecycle management, software testing, web development, web service security
    
IBM Software

3 Ways To Reduce Third-Party Application Risk and Strategies to Protect Endpoints

Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management, anti spam, anti spyware, application security, windows server, data protection
    
Lumension

Virtualization Security Risks: How to Develop Your Strategic Approach Now

Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, virtualization
    
Lumension
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.