risk management

Results 451 - 475 of 708Sort Results By: Published Date | Title | Company Name

Think You Have Application Security Covered? Think again.

Published By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software

What Executives Need to Know About Security Testing Tools and Open Source

Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software

Managing Risk in Perilous Times- Practical Steps to Accelerate Recovery

Published By: SAP     Published Date: Jun 23, 2009
The Economist Intelligence Unit examines the lessons learned from the current financial crisis, and proposes ten practical lessons that could help to address perceived weaknesses in risk identification, assessment and management.
Tags : 
recession, sap, economist, risk management, risk, recovery, risk identification, crisis
    
SAP

The Age of Compliance: Preparing for a Riskier and More Regulated World

Published By: SAP     Published Date: Aug 17, 2010
Most organizations find managing risk and compliance a challenge - but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise - and protect both corporate performance and reputation.
Tags : 
sap, risk, regulation, grc, risk, compliance, governance, erm
    
SAP

How Financially Viable Are Your Suppliers?

Published By: SAP     Published Date: Apr 14, 2011
It's a near-daily occurrence: Companies of all sizes in all geographies are going out of business, which has a ripple effect both upstream and downstream. Learn in this AMR Research article, what you can do to monitor and minimize supplier risks.
Tags : 
suppliers, due diligence, continental vdo, honeywell aerospace, mitigation planning, visibility, opportunity management, supply chain risk management
    
SAP

Next Generation Privileged Identity Management: Are You Ready?

Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation

Three Important Reasons for Privileged Access Management (and One Surprising Benefit)

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability, it management
    
Centrify Corporation

Close the Window on Three Window Server Threat Scenarios

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation

Improved decision-making and insight with holistic ALM

Published By: IBM     Published Date: Aug 22, 2014
Model both assets and liabilities in a single platform for greater accuracy.
Tags : 
risk management, risk analytics, alm modeling, financial modeler
    
IBM

Credit risk management: Collateral, covenants and risk review

Published By: IBM     Published Date: Aug 22, 2014
The ongoing processes of managing collateral, loan covenants and monitoring borrowers' financial condition are key to ensuring that banks are in the best position to minimize loss.
Tags : 
credit risk management, managing collateral, financial monitoring, risk analytics
    
IBM

How is regulatory stress-testing shaping the future for banks?

Published By: IBM     Published Date: Aug 22, 2014
Learn how an integrated modeling approach to regulatory stress-testing can help banks improve their overall risk management.
Tags : 
stress-testing, risk analytics, risk management, intergrated modeling approach
    
IBM

The Convergence of Enterprise Governance, Risk & Compliance Software Solutions

Published By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC Platform: Hypatia Research Group - The Convergence of Enterprise Governance, Risk & Compliance Software Solutions: Best Practices, Benchmarks & Vendor Galaxy Evaluations
Tags : 
ibm, enterprise governance, risk, compliance software, software solutions, hypatia research, grc, grc software
    
IBM

Operational Risk Management in the World of Big Data

Published By: IBM     Published Date: Nov 19, 2014
Risk Management: OpenPages GRC: Operational risk management in the world of big data - Unlocking the value of loss event data and driving the risk-aware enterprise
Tags : 
ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
IBM

Partially Cloudy: The Benefits of Hybrid Deployment Models

Published By: IBM     Published Date: Nov 19, 2014
Risk Management: General: Partially cloudy: the benefits of hybrid deployment models
Tags : 
ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
IBM

TH!NK - Back to the Future: Revisiting Capital and The Bank of Tomorrow

Published By: IBM     Published Date: Nov 19, 2014
Algorithmics: Back to the future - Revisiting capital and the bank of tomorrow
Tags : 
ibm, risk management, capital management, cash management, data availability, future banking, business intelligence, return on investment
    
IBM

Evolution for Efficiency: Active Collateral Management

Published By: IBM     Published Date: Nov 19, 2014
Risk Management: Algo Collateral: Evolution for efficiency - Active Collateral Management
Tags : 
ibm, efficiency, collateral management, risk management, financial landscape, financial transactions, otc market, financial regulation
    
IBM

A Business Risk Approach to IT Governance

Published By: IBM     Published Date: Jan 20, 2015
An introduction to the key concepts and challenges of IT governance and how these can be efficiently approached and mitigated with IBM® OpenPages® IT Governance.
Tags : 
business risk, it governance, it risk management, kpis, it policies
    
IBM

Case Study: KLP empowers the front and middle office with advanced risk analytics

Published By: IBM     Published Date: Jan 20, 2015
Deploying a flexible, user-friendly framework for cloud-based risk modeling across multiple asset classes.
Tags : 
risk analytics, cloud-based risk modeling, asset classes, asset management, portfolio management, security, it management, knowledge management
    
IBM

Business analytics in banking: Three ways to win

Published By: IBM     Published Date: Feb 03, 2015
Find out how banks are increasing customer profitability, improving operational efficiency and managing risk more effectively with IBM Business Analytics software.
Tags : 
customer profitability, operational efficiency, business analytics, banking, risk management, security, it management, knowledge management
    
IBM

IBM Financial Transaction Manager Speeds introduction of new transaction services

Published By: IBM     Published Date: Jul 22, 2015
By using FTM, financial institutions can gain visibility into message processing, balance financial risk and facilitate effective performance management.
Tags : 
financial transaction manager, ftm, financial risk management, business applications, enterprise, data management solutions, storage management, enterprise applications
    
IBM

Aligning IT with Strategic Business Goals

Published By: IBM     Published Date: Dec 03, 2015
This white paper examines the business challenges and risks that IT dependence can present and why traditional approaches to IT risk management have become inadequate.
Tags : 
ibm, information technology, strategy, business goals, risk management, it management, business technology
    
IBM

Mapping Roles and Responsibilities for Social Media Risk

Published By: Nexgate     Published Date: Jun 17, 2015
This report will outline a framework for assigning roles and responsibilities to manage social media risk.
Tags : 
proofpoint, nexgate, social media risk, social media, risk management, compliance, security policies, content delivery
    
Nexgate

3 Strategies to Protect Endpoints from Risky Applications

Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security, cyber crime, anti virus, hacker detection
    
Lumension

Achieving Program Integrity for Health Care Cost Containment Operations

Published By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
    
SAS

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.