Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 101 - 125 of 324Sort Results By: Published Date | Title | Company Name
By: Rapid7     Published Date: Apr 04, 2013
This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.
Tags : rapid7, protect organization, attacks via phishing, solution based approach, mitigating risks, intrusion detection, intrusion prevention, phishing, security policies, risk management, data protection
     Rapid7
By: SAS     Published Date: Mar 19, 2013
A Research Report Detailing How Organizations are Using Data Visualization to Succeed with Big Data
Tags : big data, visualization, interactive, data, data visualization, application integration, business activity monitoring, business analytics, business intelligence, business metrics, risk management
     SAS
By: Deltek - Nethawk     Published Date: Mar 05, 2013
This 30- minute webcast recording reviews the basics of project management and reporting for government contractors. Based on content from the Deltek Special Edition Government Contracting for Dummies e-book.
Tags : project management, government contractors, reporting, spending, budget management, project execution, application integration, best practices, business activity monitoring, business integration, business intelligence, return on investment, risk management
     Deltek - Nethawk
By: McAfee     Published Date: Feb 06, 2013
This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.
Tags : security management platform, siem, log management, security management 2.0, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies, best practices
     McAfee
By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor, mcafee enterprise security manager, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, compliance, identity management, internet security, intrusion detection
     McAfee
By: Datto Inc.     Published Date: Feb 05, 2013
In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.
Tags : backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
     Datto Inc.
By: Riverbed     Published Date: Oct 12, 2012
Download this paper by Riverbed and discover a clear 5-step approach to making sure every consolidation project is successful.
Tags : it consolidation, virtualization, infrastructure, risk management
     Riverbed
By: Riverbed     Published Date: Oct 12, 2012
Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. The result is dramatically shortened project times, reduced costs, and improved efficiencies.
Tags : application discovery, it planning, data consolidation, virtualization, risk management
     Riverbed
By: IBM     Published Date: Oct 01, 2012
his independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : virtualization, it infrastructure, software partitioning, reduce costs, risk management, server virtualization
     IBM
By: IBM     Published Date: Oct 01, 2012
The paper explains virtualization in the context of mid-sized businesses and shows how they can reduce costs, improve services and simplify management.
Tags : virtualization, dynamic infrastructure, ibm, risk management, system management, server virtualization
     IBM
By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
     ForeScout
By: SunGard     Published Date: Aug 13, 2012
Most organizations today understand that a disaster recovery (DR) plan is essential to their continued survival should a natural disaster occur. But implementing a DR plan entails substantial time, effort and cost - not to mention significant investment in developing new areas of technical expertise within the organization. As a result, many organizations are turning to disaster recovery service providers (DRSPs) to offload their disaster recovery operations.
Tags : sungard, recovery, service, organizations, disaster, recovery, survival, recovery, drsps, security, storage, infrastructure, server hardware, servers, vpn, business intelligence, business management, business metrics, risk management, database development
     SunGard
By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : remote repair, it management, operatin systems, pc repair, enterprise security, it managers, productivity, cloud storage, virtualization, security, wireless infrastructure, risk management
     Intel
By: IBM     Published Date: Jul 13, 2012
Learn how respondents, including nearly 400 senior executives from some of the world's largest enterprises, are incorporating holistic business resilience planning into their businesses through top-level findings and case studies. Download the research report here.
Tags : ibm, technology, risk management, global technology, technology, risk study, productivity
     IBM
By: Navisite- A Time Warner Cable Company     Published Date: Jun 20, 2012
Enterprise security should not be taken lightly but it also doesn't have to be a major roadblock either. By following these guidelines, organizations can structure security and compliance programs to take advantage of the economic advantages of managed cloud applications and services while meeting organizational security and compliance objectives.
Tags : navisite, technology, cloud comptuing, security, risk management, security management, business security, application security, security policies, vulnerability management
     Navisite- A Time Warner Cable Company
By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, application integration, application performance management, best practices, business integration, business intelligence, business management
     Symantec
By: Borland Software     Published Date: Apr 09, 2012
SilkPerformer is a cost-effective, enterprise-class performance testing solution for optimizing the performance of business apps. SilkPerformer enables performance tests that accurately simulate peak demand loads and isolate performance bottlenecks.
Tags : performance testing, software testing, application performance, performance testing tool, application integration, application performance management, best practices, business activity monitoring, business integration, business process automation, business process management, project management, risk management, sales automation, server virtualization, simulation software, system management software, spend management
     Borland Software
By: SAS     Published Date: Mar 01, 2012
This paper explores the question: what could your organization do with faster, better answers, and provides possible use case scenarios that illustrate the value this technology brings to a variety of industries.
Tags : it management, business analytics, business integration, business intelligence, business management, business metrics, business process automation, business process management, customer interaction service, customer relationship management, customer satisfaction, customer service, it spending, risk management
     SAS
By: SAS     Published Date: Mar 01, 2012
This paper defines predictive analytics, then details ways this type of analytics can be applied to marketing, risk, operations and more. It also includes information relevant to a wide variety of industries - from manufacturing to hospitals.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management, business activity monitoring, business integration, business management, business metrics, business process automation
     SAS
By: SAS     Published Date: Mar 01, 2012
Michael Lock of the Aberdeen Group focuses on the effect of end user adoption, pervasiveness, and engagement of business intelligence on business performance. Learn the necessary steps to establishing self-service business analytics.
Tags : it management, business activity monitoring, business analytics, business integration, business intelligence, business management, business metrics, business process automation, business process management, customer relationship management, customer satisfaction, customer service, enterprise resource planning, project management, risk management
     SAS
By: SAS     Published Date: Mar 01, 2012
How does an organization make the best use of data, and what is the proper role of IT? This paper describes how organizations can foster a culture of data analytics that promotes cooperation and collaboration between IT and business.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management, business activity monitoring, business integration, business management, business metrics, business process automation
     SAS
By: SAS     Published Date: Mar 01, 2012
Learn what criteria distinguished certain companies as top performers within the SMB sector, the factors to consider when assessing your organization's BI competency and the required actions to achieve best-in-class performance.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management, business intelligence, michael lock, predictive analytics, business insight, business visibility
     SAS
By: SAS     Published Date: Mar 01, 2012
This white paper reveals the results of a Bloomberg Businessweek Research Services survey of 930 respondents globally on the current state of business analytics within organizations. You'll discover how and why the use of analytics is growing!
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management, application performance management, business activity monitoring, business integration, business management, business metrics
     SAS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.