strategic risk

Results 26 - 50 of 51Sort Results By: Published Date | Title | Company Name

Enterprise Cloud: The Changing Nature of Data Center Networking

Published By: Juniper Networks     Published Date: Feb 05, 2018
The role of IT is fundamentally changing from a cost-efficient enablement technology to a more strategic element of the enterprise. For companies born before the digital era, IT is a key player on their path to digital transformation; for more recent businesses designed with technology at their core, IT represents a foundational pillar on top of which everything else is built. With this shifting role, IT’s decades-long emphasis on TCO is being eclipsed by a new-found focus on security and automation. Whether it’s the continuous risks posed by a dynamic threat landscape, the threat of digital disruption, or an inability to keep pace with the latest trends, virtually every enterprise needs to be more agile. And, with the continued evolution of compute, storage, and applications, networks have been exposed as a bottleneck to change.
Tags : 
enterprise, cloud, data, center, networking, juniper
    
Juniper Networks

Best Practices Implementing Cutting Edge Tech in FSI

Published By: Juniper Networks     Published Date: Jun 29, 2017
Whilst the FSI sector races to implement cutting-edge technologies such as AI, blockchain and automation, there are no mutually agreed upon set of best practices to implement these technologies. As a result, organisations are using their own blend of strategic initiatives and company culture to drive innovation, with varying levels of success. To help, this article features advice from five of the leading experts in the FSI and technology sector today. Several of the most visible tactics to kick-start innovation in FSI organisations include launching innovation or incubation centres, launching hackathons, partnering with or acquiring start-ups, venture investment or simply trying to develop solutions in house. Whilst each of these approaches has potential, there is a risk that organisations fall into the trap of innovation theatre, in other words, failing to effectively integrate cutting edge technology into key business functions.
Tags : 
business resources, enterprise headcounts, individual roles, organizational charts, corporate initiatives, management principles, department optimization
    
Juniper Networks

Gartner 4 Mobile Security Insights for CISOs

Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout

4 Mobile Security Insights for CISOs

Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout

Read the 2012 Evalueserve Risk and Compliance Report

Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
    
McAfee

Cyber Security: For Defenders, It's About Time

Published By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : 
cyber, security, defenders, business value, infrastructure, data, business, protection
    
McAfee EMEA

Email Retention and Archiving:Manage E-Records, Minimize Workplace Risks & Maximize Compliance

Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance, knowledge management, data management, data protection
    
MessageLabs

Compliance Analyst Report

Published By: Microsoft Office 365     Published Date: Sep 26, 2017
According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize the potential of this business collaboration platform, Microsoft and its partners have to convince business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or higher than those of their existing on-premise solutions. Even though a high percentage of enterprises are adopting cloud storage and compute within their businesses, the adoption of cloud-based content and collaboration products is by no means universal. Concerns relating to governance, risk, and compliance with regard to cloud services are understandable, but it is not unusual to find them overstated.
Tags : 
    
Microsoft Office 365

API security best practices: Protect your APIs with Anypoint Platform

Published By: MuleSoft     Published Date: Oct 10, 2019
API security has become a strategic necessity for your business. APIs facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing $400m or more, senior IT decision-makers are right to be concerned about API security. In this whitepaper, you'll learn: The top API security concerns for today's enterprises. How IT leaders can protect identity, integrity, and confidentiality of information without risking availability. The top three qualifications you need to keep your APIs secure.
Tags : 
    
MuleSoft

On-Demand Records Management: Meeting the Challenge

Published By: Oce Business Services     Published Date: Mar 24, 2008
Effective records management has never been more crucial to meeting corporate governance, risk management and operational mandates. Yet half of enterprises lack a fully implemented records management program. Download this white paper to learn how strategic outsourcing can help you mitigate risks, apply best practices, meet compliance mandates and improve overall records management ROI.
Tags : 
oce, records management, knowledge management, compliance, best practices, document management, information management
    
Oce Business Services

Turning Strategy Into Action

Published By: Oracle Primavera     Published Date: Feb 10, 2015
If you don’t know where you are, you don’t have much hope of arriving at your planned destination. C-suite executives and senior management understand this only too well when they tackle their number one problem: executing on strategy. In this executive brief, Harvard Professor Robert Kaplan explains the importance of linking operations and day-to-day projects to strategic objectives. He introduces tools to help you measure strategic outcomes, take close control of strategic progress, minimize risk, and maximize growth.
Tags : 
oracle, integrating strategy, strategic projects, project management
    
Oracle Primavera

Transitioning to Cloud Business: Best Practices for ISVs

Published By: Progress Software     Published Date: Mar 12, 2014
Progress Software and Saugatuck Technology have come together to provide this Saugatuck Strategic Report which provides guidance to ISVs in transition not just to the Cloud – but to entirely new ways of doing business, new requirements from customers and partners, and new opportunities that enable significant reward, and related potential risk. This report shares not only Saugatuck’s analysis of key market shifts, and the key challenges faced by ISVs in these transitions, but also provides ISVs with critical success factors and best practices from more than seven years of Saugatuck Technology research and business consulting with a diverse range of software providers around the world.
Tags : 
progress software, saugatuck technology, isv, best practices, business challenges, cloud transition, technology challenges, knowledge management
    
Progress Software

Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform

Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
Qualys

Leveraging Security Risk Intelligence: The Strategic Value of Measuring Real Risk

Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
    
Rapid7

Standardize to Increase Stability, Reliability, and Efficiency for Less

Published By: Red Hat     Published Date: Jul 17, 2014
As a strategic partner in your business, you need to respond to growing business demand. Unfortunately, you face several challenges. Your complex IT environment is costly to manage and has a high downtime risk. Most of your resources and budget likely go to maintaining the stability, security and reliability of your IT system. Your organization might lack the processes needed to confidently manage support issues, IT transitions and new application deployments. In this whitepaper you will read about how to maximize uptime, reduce management costs, and quickly respond to business demands.
Tags : 
business demand, security, it transitions, new applications, it systems, efficiency, maximize uptime, manage costs
    
Red Hat

The Two Faces of Risk: Cultivating Risk Intelligence for Competitive Advantage.

Published By: SAP Inc.     Published Date: Jul 28, 2009
Need to optimize your risk management program? Strategic risk management is crucial because of increased regulatory pressures, stakeholder pressures, the impact on capital costs, the personal effect of corporate risk, and the effect of the Internet of quickening the pace of dealing with risk factors.
Tags : 
risk, sap, risk intelligence, competitive advantage, strategic risk, risk management, deloitte, rewarded risk
    
SAP Inc.

Leading the Digital Trust & Safety Transformation

Published By: Sift     Published Date: Jul 12, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now"
Tags : 
    
Sift

On-Demand Forrester Webinar: Leading the Digital Trust & Safety Transformation

Published By: Sift     Published Date: Oct 16, 2019
"In today’s digital landscape, balancing user experience with customer safety has never been more important -- or more difficult. By surveying 500 employees responsible for fighting fraud, Sift found that 77% prioritize delivering a frictionless experience, but nearly as many say fraud prevention blocks this goal. The answer isn’t additional fraud prevention. Businesses must adopt a Digital Trust & Safety approach, strategically aligning risk and revenue decisions supported by sophisticated processes and technology. How can you optimize your business strategies for the challenges and opportunities of the digital world? Read This Guide To Find Out How to move beyond reactive fraud-fighting strategies and deliver excellent customer experiences without compromising safety The 4 qualities of a Digital Trust & Safety organization A step-by-step guide to help you evolve to Digital Trust & Safety Why the time for Digital Trust & Safety is now "
Tags : 
    
Sift

Demand More From Suppliers: How the Right Partnership Boosts Your Bottom Line

Published By: Sparton Corporation     Published Date: Oct 09, 2018
Manufacturing suppliers range from approved vendors and contract manufacturers (CMs) who only deliver materials and services to complex strategic partnerships. A transactional relationship based primarily on order fulfillment might work well for some companies. However, by taking a CM relationship to the next level of supplier-partner, organizations gain strategic benefits including cost savings, reduced risks, and optimized profits. The right cultural fit and the right-sized partner for your business can play a key role in building this long-term relationship.
Tags : 
    
Sparton Corporation

Workforce 2020: The Looming Talent Crisis Research Report

Published By: Success Factors     Published Date: Oct 07, 2014
Few things matter more to business success than human capital. The right mix of people, skills, and culture can create competitive advantage for companies, reshape industries, and drive prosperity across regions. As a new generation joins the labor market and employment options evolve in an increasingly global and knowledge-based economy, effective workforce management is a strategic imperative. Opportunities abound in this new environment, for both employers and employees—but so do risks.
Tags : 
successfactors, talent, human capital, labor market, employment, employees, employers, knowledge based economy
    
Success Factors

Gartner: Seven Imperatives to Adopt a CARTA Strategic Approach

Published By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
    
Tenable

Signs You Need a New QA Platform

Published By: Tricentis     Published Date: Mar 13, 2018
Quality testing has a cross-functional, strategic impact on corporate risk management, revenue and reputation, but it often doesn’t garner full appreciation for its role, often evidenced by a lack of investment in a best-in-class QA platform. Signs that an existing solution isn’t sufficient include:
Tags : 
    
Tricentis

It's Time for IDS to Detect Intrusions Again

Published By: Vectra Networks     Published Date: Nov 05, 2015
Intrusion Detection Systems have ceased to live up to their name and have lost their ability to spot today’s sophisticated intrusions. Consequently, cyber attackers are taking advantage of it by launching more evasive and strategic threats that spread rapidly within networks. And security teams are left without the proper tools or insight to identify intrusions that pose the biggest risk.
Tags : 
intrusion detection systems, cyber attackers, sophisticated intrusions, intrusion detection, security
    
Vectra Networks

eBook: The Definitive Guide to Workforce Analytics: A Practical Guide for Today’s HR Professional

Published By: Visier     Published Date: Nov 04, 2014
With workforce analytics, HR professionals can play a more pivotal role in their organizations to help direct senior management and hiring managers in connecting the dots between their company’s overall performance and their investment in their workforce. Workforce analytics empower HR professionals to shift from being an operational function to becoming more of a strategic role within their organization. Workforce analytics uncovers deep insights into workforce data by drilling down into the data and highlighting both patterns of success to be repeated and patterns of failure that could lead to risk and impact. Go from intuition- to fact-based workforce decision-making with this comprehensive guide to workforce analytics. This eBook includes advice on how to get started, tips to ensure successful implementation, and key recommendations for finding the right solution
Tags : 
visier, workforce analytics, hr metrics, planning
    
Visier

Eliminate Alert Fatigue by Creating a Culture of Intelligent Communication

Published By: xMatters     Published Date: Aug 22, 2014
More and more IT leaders are seeing themselves as strategic business value generators for the company. According to a 2013 Ponemon Institute report on the IBM Global Study on the Economic Impact of IT Risk, top concerns among IT leaders now include maximizing employee productivity, enhancing the company’s brand value and reputation,expanding into new global markets, minimizing customer defection, maximizing customer acquisition, and increasing revenues and positive cash flow. So how do you get there? Start by developing a notification plan.
Tags : 
fatigue, communication, business, value, generators, it risk, productivity, acquisition
    
xMatters
Start   Previous    1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.