Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 276 - 300 of 324Sort Results By: Published Date | Title | Company Name
By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : data, identity, security, network, protection, mobile, security, documents
     CDW Symantec
By: Marketo     Published Date: Jul 31, 2012
The Definitive Guide to Marketing Metrics and Marketing Analytics shows marketing professionals how to talk the talk of C-level executives in terms of forecasting and reporting, and walk the walk to the revenue table by leveraging metrics that matter.
Tags : definitive, guide, marketing, metrics, analytics, marketo, roi, leans
     Marketo
By: Citrix Systems     Published Date: Feb 18, 2012
Ready for 2048-bit SSL? The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. Download the Citrix and Verisign White Paper and the NetScaler Performance Comparison now.
Tags : 2048-bit ssl, security, ssl, performance, citrix, verisign, netscaler, cloud
     Citrix Systems
By: ScriptLogic     Published Date: Nov 14, 2011
The aim of this document is to highlight ways in which ScriptLogic solutions can be used to bring Microsoft Windows-based IT systems into line with the requirements of the Payment Card Industry (PCI) Data Security Standard.
Tags : pci compliance, compliance, scriptlogic, pci, security standard, data security, lifecycle, virtual
     ScriptLogic
By: IBM Business Analytics     Published Date: Jun 23, 2011
David Axson, author of The Management Mythbuster, explains how insightful analytics and a systematic approach to risk management can drive dramatic improvements in the quality and value that finance organizations deliver.
Tags : ibm business analytics, david axson, enterprise risk management, erp, enterprise resource planning, insightful analytics, finance function, business analytics
     IBM Business Analytics
By: Symantec.cloud     Published Date: Apr 28, 2011
This white paper discusses how SaaS can simplify IT management.
Tags : symantec.cloud, it security management, saas, risk prevention, security, software as a service, backup and recovery, anti spam
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 18, 2011
This white paper focuses on the critical need to manage outbound content sent via various avenues including email, Instant Messages, text messages, tweets, and Facebook posts.
Tags : symantec cloud, outbound content management, email, messaging, risk mitigation, security management, secure instant messaging, risk management
     Symantec.cloud
By: Qualys     Published Date: Apr 05, 2011
To help you understand how to minimize these risks, Qualys provides this guide as a primer to web application security.
Tags : web application security, qualys, vulnerabilities, sql injection, ssi injection, xpath injection, attacks, qualysguard was 2.0
     Qualys
By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy
     Qualys
By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft, anti spam, anti spyware
     Lumension
By: Lumension     Published Date: Mar 28, 2011
This paper highlights the four steps organizations should take to automate and streamline the patch management process.
Tags : lumension, patch management, patch deployment, vulnerability, risk mitigation, best practices, risk management, vulnerability management
     Lumension
By: PC Mall     Published Date: Mar 02, 2011
Download this HP white paper to learn how to reduce the financial impact and maintain acceptable levels of productivity during an unplanned disaster.
Tags : pc mall, disaster recovery, it risks, business continuity, outage, risk management, server virtualization
     PC Mall
By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory
     Kingston
By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : software design, application development, web design, offshoring, it solutions, consulting, active directory, bandwidth management
     M3 Consulting, Inc.
By: Symantec.cloud     Published Date: Nov 29, 2010
Read the latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
     Symantec.cloud
By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : lumension security, patch management, vulnerability management, risk mitigation, best practices, operating system, patch deployment, application security
     Lumension
By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : emerging trends, emerging technologies, hype cycle, new technologies, it trends, active directory, bandwidth management, convergence
     Gartner, Inc
By: Neverfail     Published Date: Sep 10, 2010
Best Practices for Simplifying and Automating Email Continuity
Tags : exchange 2010, high availability, neverfail, email continuity, exchange server availability, backup and recovery, business continuity, disaster recovery
     Neverfail
By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : messagelabs us, it security, smb, risk management, protection, malware, anti-spam, anti-virus
     Symantec.cloud
By: xmannnnn     Published Date: Aug 06, 2010
Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.
Tags : active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking, governance
     xmannnnn
By: Project Perfect     Published Date: Jan 28, 2010
This white paper suggests project management methods and practices can move from a static, unidirectional framework, to a dynamics, multidirectional framework.
Tags : risk management, development risks, operational risks, enterprise architecture, eric tse, project management
     Project Perfect
By: Project Perfect     Published Date: Jan 28, 2010
This paper highlights and consolidates interesting risk management topics for enterprise information systems from enterprise architect and system integration perspectives.
Tags : dynamics, role dyanmics, project dymanics, eric tse, project management, enterprise software, return on investment, risk management
     Project Perfect
By: IBM     Published Date: Aug 28, 2009
You've already taken basic cost-cutting steps and saved the easy money. You know that you need to dig deeper. But where should you start? What's killing your IT budget?
Tags : storage expansion, system complexity, hardware sprawl, reliability, scalability, compliance, dba, roi
     IBM
By: IBM     Published Date: Aug 28, 2009
Use the IDS Low Administration ROI tool to assess potential savings and expenses in deploying IBM Informix Dynamic Server 11.
Tags : roil, ibm, ibm informix dynamic server, minimize administration time and cost, assess potential savings and expenses, data server infrastructure, corporate data infrastructure, industry-wide assumptions
     IBM
By: Citrix Online     Published Date: Apr 06, 2009
Today, stakeholders and projects pepper the globe. Successfully navigating the project lifecycle - from risk management and estimating to managing scope and facilitating knowledge transfer - now requires a different recipe.
Tags : citrix, project management, project lifecycle, risk management, managing scope, risk, collaboration, projects
     Citrix Online
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.