risk management

Results 426 - 450 of 689Sort Results By: Published Date | Title | Company Name

What Businesses Need to Know About Cyber Security

Published By: Lumension     Published Date: Oct 20, 2014
Sit in on an expert panel discussion about the concerns of cyber security for businesses.
Tags : 
lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
Lumension

2015 State of the Endpoint Report: User-Centric Risk

Published By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity, business technology
    
Lumension

10 Steps to Mitigate a DDoS Attack in Real Time

Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection, secure business, network security, hacker detection
    
F5 Networks

Grow Your IoT Security Business by Investing in Real-Time Discovery, Visibility and Control

Published By: Great Bay Software     Published Date: Jan 04, 2018
By 2020 Gartner estimates the proliferation of IoT with a market installed base of 20.4 billion endpoint devices, comprised of both "smart" and "dumb" devices, each leveraging multiple communication types. As each of these devices can become a target entry point for hackers, endpoint and network visibility is a top concern for CISOs responsible for security and risk management.
Tags : 
iot, iot security, iot endpoint security, gartner
    
Great Bay Software

Asset Decommissioning in Oil & Gas: Transforming Business

Published By: Oracle Primavera     Published Date: Oct 09, 2015
Asset intensive organizations like Oil and Gas have their own industry specific challenges when it comes to managing their asset's lifecycles. One area that is often overlooked or pushed off until the last minute is the decommissioning phase of their assets. Leaders in the industry turn to three areas to transform their business-Risk and Financial Management, Operational Excellence, and Innovation
Tags : 
oracle, asset decommissioning, oil and gas, oil and gas industry, risk management, financial management, operational excellence, innovation
    
Oracle Primavera

The Importance of Decommissioning in Asset Intensive Industries

Published By: Oracle Primavera     Published Date: Oct 09, 2015
This report from the Aberdeen Group explores the challenges that those in asset intensive industries face when it comes to managing their asset’s lifecycles. Leaders in this industry turn to three areas to transform their business – Risk and Financial Management, Operational Excellence, and Innovation.
Tags : 
oracle, aberdeen group, risk management, financial management, operational excellence, innovation, decommissioning, asset intensive industries
    
Oracle Primavera

2015 State of the Endpoint Report: User-Centric Risk

Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity, cloud computing
    
Lumension

Forrester's Risk-Driven Identity And Access Management Process Framework

Published By: Okta     Published Date: May 12, 2017
This report describes how security and risk professionals (S&R pros) can apply risk concepts across the entire iAM process portfolio and use behavior-based trending methods to reduce security exposure, ease the burden of iAM policy management, and improve the user experience.
Tags : 
    
Okta

4 Step Get Started Guide to Open Source Security Triage

Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software

What Security Professionals Need to Know About Open Source Vulnerabilities

Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software

Think You Have Application Security Covered? Think again.

Published By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software

What Executives Need to Know About Security Testing Tools and Open Source

Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software

Managing Risk in Perilous Times- Practical Steps to Accelerate Recovery

Published By: SAP     Published Date: Jun 23, 2009
The Economist Intelligence Unit examines the lessons learned from the current financial crisis, and proposes ten practical lessons that could help to address perceived weaknesses in risk identification, assessment and management.
Tags : 
recession, sap, economist, risk management, risk, recovery, risk identification, crisis
    
SAP

The Age of Compliance: Preparing for a Riskier and More Regulated World

Published By: SAP     Published Date: Aug 17, 2010
Most organizations find managing risk and compliance a challenge - but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise - and protect both corporate performance and reputation.
Tags : 
sap, risk, regulation, grc, risk, compliance, governance, erm
    
SAP

How Financially Viable Are Your Suppliers?

Published By: SAP     Published Date: Apr 14, 2011
It's a near-daily occurrence: Companies of all sizes in all geographies are going out of business, which has a ripple effect both upstream and downstream. Learn in this AMR Research article, what you can do to monitor and minimize supplier risks.
Tags : 
suppliers, due diligence, continental vdo, honeywell aerospace, mitigation planning, visibility, opportunity management, supply chain risk management
    
SAP

Next Generation Privileged Identity Management: Are You Ready?

Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation

Three Important Reasons for Privileged Access Management (and One Surprising Benefit)

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability, it management
    
Centrify Corporation

Close the Window on Three Window Server Threat Scenarios

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation

Improved decision-making and insight with holistic ALM

Published By: IBM     Published Date: Aug 22, 2014
Model both assets and liabilities in a single platform for greater accuracy.
Tags : 
risk management, risk analytics, alm modeling, financial modeler
    
IBM

Credit risk management: Collateral, covenants and risk review

Published By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : 
credit risk management, managing collateral, financial monitoring, risk analytics
    
IBM

How is regulatory stress-testing shaping the future for banks?

Published By: IBM     Published Date: Aug 22, 2014
Learn how an integrated modeling approach to regulatory stress-testing can help banks improve their overall risk management.
Tags : 
stress-testing, risk analytics, risk management, intergrated modeling approach
    
IBM

The Convergence of Enterprise Governance, Risk & Compliance Software Solutions

Published By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC Platform: Hypatia Research Group - The Convergence of Enterprise Governance, Risk & Compliance Software Solutions: Best Practices, Benchmarks & Vendor Galaxy Evaluations
Tags : 
ibm, enterprise governance, risk, compliance software, software solutions, hypatia research, grc, grc software
    
IBM

Operational Risk Management in the World of Big Data

Published By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC: Operational risk management in the world of big data - Unlocking the value of loss event data and driving the risk-aware enterprise
Tags : 
ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
IBM

Partially Cloudy: The Benefits of Hybrid Deployment Models

Published By: IBM     Published Date: Nov 19, 2014
Risk Management: General: Partially cloudy: the benefits of hybrid deployment models
Tags : 
ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
IBM

TH!NK - Back to the Future: Revisiting Capital and The Bank of Tomorrow

Published By: IBM     Published Date: Nov 19, 2014
Algorithmics: Back to the future - Revisiting capital and the bank of tomorrow
Tags : 
ibm, risk management, capital management, cash management, data availability, future banking, business intelligence, return on investment
    
IBM
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.