Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 76 - 100 of 324Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: May 08, 2014
A white paper on the increasing mobility of organisations and the technology available to facilitate and secure throughout this change.
Tags : enterprise, mobility, security mobility, citrix, netscaler, application security, internet security, network security appliance, application integration, risk management
     Citrix
By: IBM     Published Date: Apr 22, 2014
Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.
Tags : ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance, risk management
     IBM
By: IBM     Published Date: Apr 22, 2014
Is IT leaving your company exposed to reputational damage? Find out how your organization compares to companies with “excellent” reputations.
Tags : ibm, it management, risk management, risk, risk management strategy, reputational risk, security
     IBM
By: EMC Corporation     Published Date: Mar 20, 2014
The top five questions to ask regarding Identity and Access Management.
Tags : emc, iam, strategic solutions, access reviews, access request, identity management, business intelligence, enterprise resource planning, enterprise software, risk management
     EMC Corporation
By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.
Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business intelligence, business management, risk management
     EMC Corporation
By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showing the benefits of an RSA Averska IAM Solution.
Tags : emc, rsa averska, iam, strategic solutions, access reviews, access request, identity management, business integration, business intelligence, risk management
     EMC Corporation
By: IBM     Published Date: Feb 12, 2014
Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.
Tags : ibm, business analytics, finance, forecasting, risk management, business forecasting, predictive analysis, forecasting lexicon, return on investment
     IBM
By: IBM     Published Date: Feb 12, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management, integration, ccr solution, business analytics, data integrity, return on investment, risk management
     IBM
By: IBM     Published Date: Feb 12, 2014
Develop or restore forecasting health by adhering to the six principles presented in this paper.
Tags : ibm, business analytics, forecasting, budgeting, financial management, risk management, return on investment
     IBM
By: IBM     Published Date: Jan 10, 2014
Independent research by Wintergreen Research, Inc. shows "Dramatic savings brought by IBM Rational automated test solutions".  Read this paper to see how you can see a positive ROI through the ability to minimize cost and time to identify errors and diminish subsequent impacts of defects using test automation and service virtualization.
Tags : ibm, wintergreen research, software testing, service virtualization, software development, testing, automation, quality assurance, roi, cost reduction, test automation, rational, risk management, data management, test and measurement, it spending, performance testing, return on investment, productivity
     IBM
By: IBM     Published Date: Jan 02, 2014
Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information---based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits. Business intelligence derived from sophisticated analytics has given large companies an edge for years. It helps them be more competitive, make information---based decisions faster and better, improves operational efficiencies, and boosts the bottom line. Midsize businesses are increasingly eager to reap similar benefits.
Tags : ibm, business analytics, midsize businesses, geeknet, business intelligence, customer volatility, market volatility, variety of data, it managers, implementing analytics, ba systems, ba solutions, in-house analytics, ba capability, scorecarding, time-to-insight, business risk, business planning, data management, it spending
     IBM
By: Qualys     Published Date: Nov 05, 2013
Vulnerabilities in web applications are a major vector for cyber-crime. In large organizations, vulnerable web applications comprised 54% of all hacking breaches and led to 39% of compromised records, according to the 2012 Data Breach Investigation Report by Verizon Business. This paper describes how large enterprises can effectively discover, catalog and scan web applications to control this major risk vector as part of their organization’s overall vulnerability management program.
Tags : qualys, qualysguard was, vulnerability, vulnerability management, web applications, applications, vulnerable web applications, cybercrime, hacking breaches, security, application security, web application security, risk management, robustness, scanning, cloud platform, hacker detection, internet security, security management
     Qualys
By: IBM     Published Date: Oct 30, 2013
Learn how you can extend the narrative reporting capabilities of your entire organization--while maintaining auditability and control.
Tags : ibm, cognos disclosure management, business intelligence, data collection, aggregation, data repository, executive management, decrease risks, decrease data inaccuracies, business forecasts, knowledge management, risk management
     IBM
By: IBM     Published Date: Oct 24, 2013
Read about a four-step program for incorporating risk into your business forecasting and learn to spot traps that can snare the unwary.
Tags : ibm, mastering risk, business forecasting, business analytics, ibm software, variation, predictable risk, discontinuities, unpredictable risk, active risk management, passive risk management, error analysis, long-term forecast error, business activity monitoring, business management, risk management
     IBM
By: IBM     Published Date: Oct 24, 2013
Learn how automating 'Last Mile of Finance' processes can help CFOs and their finance teams meet expanded reporting requirements--including XBRL tagging.
Tags : ibm, cognos disclosure management, business intelligence, data collection, last mile of finance, account reconciliation, internal management, financial reporting, financial controls, financial workflow, regulatory reporting, applications, extensible business reporting language, application integration, risk management
     IBM
By: IBM     Published Date: Oct 10, 2013
Like many financial institutions today, the full-service Swedish bank featured in this case study has responded to changing customer needs, evolving from its original founding more than 100 years ago. As a result, the bank has realized remarkable success. Of course, along with that success have come significant challenges. New business growth, plus the rise in Internet and mobile banking, intensified the bank’s need for continuous availability of its IT infrastructure. IBM Resiliency Consulting Services helped the bank strengthen and streamline its environment. In the case study, you can read how teaming with IBM helped the bank meet recovery point and recovery time objectives; mitigate risk; and provide the flexibility to meet business demands without added IT expense.
Tags : ibm, resiliency consulting, ibm, full-service swedish bank, hyperswap, optimizing risk management, risk management, bank optimization, management capabilities, swedish banks, resiliency consulting, consulting solution, infrastructure, network management, network performance management, data protection
     IBM
By: IBM     Published Date: Oct 10, 2013
Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven common misconceptions about disaster recovery. You'll also discover how new technologies can help modernize disaster recovery efforts.
Tags : avoid pitfalls, business pitfalls, disaster recovery, recovery plans, business recovery, evolving business, business expectations, business threats, outdated assumptions, recovery efforts, failed organization, work to recover, business continuity, risk management
     IBM
By: IBM     Published Date: Oct 10, 2013
In an around-the clock business world, you need nearly instantaneous failover and failback of your critical applications. Otherwise, you risk business losses and brand damage in the event of disruption or disaster. But how can you improve your existing disaster recovery operations? Read this brochure to learn how the power of cloud technologies can help you increase recovery speed, reliability and scalability
Tags : cloud, cloud technologies, cloud computing, applications, critical applications, applications management, risk, business losses, brand damage, disruption, disaster recovery, disaster recovery operations, loss prevention, recovery speed, reliability, scalability, security, it management, risk management, data protection
     IBM
By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets, protection, safeguarding, outsourcing, risk management, data loss, data loss prevention, global it solutions, best practices, enterprise resource planning, it spending, return on investment
     IBM
By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
     GeoTrust
By: TIBCO     Published Date: May 15, 2013
Integration may not be new, but its role has drastically changed. Once used simply for support, it is now an enabler – serving as an indispensable foundation critical to achieving agility, efficiency, and growth. Done well, it can drive better business decisions, more cost-effective operations, and be the catalyst for competitive advantage. Architected without a clearly defined strategy, however, integration will fail to deliver on its promise. What are some of the pitfalls you can avoid when augmenting an existing infrastructure to maximize performance, results, and success? Read on.
Tags : integration, infrastrucutre, performance, enterprise, efficiency, growth, application integration, application performance management, best practices, business integration, return on investment, risk management
     TIBCO
By: Caristix     Published Date: May 03, 2013
The costs and risks associated with the entire interfacing lifecycle are no longer acceptable in a world that requires fast turnarounds and go-live dates. Those implementing HL7 interfaces can tap into new – and proven – best practices for more effective scoping and overall project success.
Tags : hl7, integration, interface, midical, heathcare, costs, risks, interfacing project, application integration, application performance management, best practices, business analytics, business integration, business intelligence, project management, return on investment, risk management
     Caristix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.