risk

Results 1 - 25 of 2760Sort Results By: Published Date | Title | Company Name
Published By: Xerox     Published Date: Jun 11, 2015
Procuring multi-function devices via the RM1599 framework. Delivering savings. Reducing risk. Saving you time.
Tags : 
    
Xerox
Published By: Informatica Systems     Published Date: Jun 25, 2014
Decisions which are made on the basis of poor-quality data expose public sector bodies to risk, and cost them money. Download the free whitepaper and see how you can make your data pay dividends.
Tags : 
    
Informatica Systems
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Sage EMEA     Published Date: Jan 29, 2019
SagecommissionedForresterConsultingtoconducta TotalEconomicImpact™(TEI)studytoexaminethe potentialreturnoninvestment(ROI)organizationsmay realizebydeployingits Enterprise Management solutionas part of Sage Business Cloud.Thepurpose ofthisstudyistoprovidereaders withaframework to evaluatethepotentialfinancialimpactof Enterprise Managementwithintheir organizations. Tobetter understandthebenefits,costs,andrisks associatedwithaninvestmentinEnterprise Management,Forrester conducted in-depth interviews withtwoEnterprise Managementcustomers. For a brief description of each customer, see the Analysis section. According toSage,Enterprise Managementis an integratedand globalenterprise business management solution for purchasing, manufacturing, inventory, sales, customer service,and financial management. Formoredetails ontheEnterprise Management solution,seeAppendix A. For this TEI study, Forrester has created a compositeOrganizationto illustrate the quantifiable benefits and costs of investing i
Tags : 
    
Sage EMEA
Published By: RSM US     Published Date: Feb 08, 2019
In today’s rapidly changing economy, business leaders are constantly thinking about how to attract, engage, manage, develop and retain their talent. The brisk rate of technology transformation, the increase in demand for unique skills and the expansion of regulatory requirements all create challenges as well as opportunities around attracting and developing a diverse workforce. Quickly and effectively responding to the business needs of your employees by optimizing processes and technologies—while mitigating risk—enables you to drive growth, productivity and profitability.
Tags : 
    
RSM US
Published By: bChannels - Software One     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
    
bChannels - Software One
Published By: Larsen & Toubro Infotech     Published Date: Jan 31, 2019
LTI helped a leading global bank digitize its traditional product ecosystem for AML transaction monitoring. With the creation of a data lake and efficient learning models, the bank successfully reduced false positives and improved customer risk assessment. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech
Published By: Larsen & Toubro Infotech     Published Date: Jan 24, 2019
Though technology disruption in the media and entertainment industry have caused a strong shift towards digital businesses, linear TV broadcasting still holds a majority revenue share for broadcasters and that is not going to change anytime soon. Broadcasters can in fact leverage some of these disruptive technology advancements to know more about their ecosystem, especially their consumers, and leverage those deeper insights to deliver more value to their consumers and advertisers. Realizing the potential risks and opportunities, media companies are making heavy investments towards enabling higher value for TV consumers and advertisers in an attempt to sustain, at minimum, their traditional TV broadcasting business. The first of the top three investments made by the media firms should be on data and analytics to understand more about TV consumers’ content preferences and viewing patterns.
Tags : 
    
Larsen & Toubro Infotech
Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to analyzing and mitigating the risks of migrating to PostgreSQL. With the ongoing shift towards open-source database solutions, it’s no surprise that PostgreSQL is the fastest growing database. While it’s tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. A key decision criteria for adopting any technology is whether it can support requirements for existing applications while also fitting into longer term strategies and needs. The first section of this eBook provides a detailed analysis of all aspects of migrating from legacy and commercial solutions to PostgreSQL: ? Schema and code migration ? Data migration ? Application code migration ? Testing and evaluation
Tags : 
    
Stratoscale
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Time Clock Plus     Published Date: Feb 07, 2019
For most companies, the Human Resources department has a long history of guarding sensitive employee data. Rows of beige file cabinets line a back closet where only those with a key and knowledge of the filing system have access to the personal information of countless employees. The greatest risk to this data has always been fire or water damage, but that’s quickly changing with the emergence of online data storage.
Tags : 
    
Time Clock Plus
Published By: Forcepoint     Published Date: Jan 03, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
software-defined wide area network, sd-wan, sd wan, next generation firewall, ngfw, distributed offices, digital transformation, branch security, distributed network
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
software-defined wide area network, sd-wan, sd wan, next generation firewall, ngfw, distributed offices, digital transformation, branch security, distributed network
    
Forcepoint
Published By: Tricentis     Published Date: Jan 22, 2019
Recent SAP advancements such as SAP S/4HANA and SAP Fiori 2.0 enable the agile, modular and distributed enterprise application environment necessary for successful Digital Transformation. However, as organizations upgrade, it becomes increasingly clear that conventional (manual) software testing approaches can’t satisfy the new business demands. Read this paper to learn: Why traditional manual testing can’t handle the increased demands on testing How SAP test automation addresses these shortcomings How SAP test automation helped leading enterprises accelerate testing, reduce business risk, and streamline the SAP S/4HANA migration process
Tags : 
    
Tricentis
Published By: Infosys     Published Date: Feb 12, 2019
DevOps is fast assuming greater importance in deciding the agility of an enterprise. A robust DevOps setup is crucial for successful agile delivery and minimal risks. It greatly optimizes release management costs and team productivity, resulting in reduced time to market. At the same time, DevOps enables organizations to make rapid product releases with increased quality and manage customers' expectations. In this paper we explore various aspects of DevOps. We look at key success attributes, main processes, tools, and frameworks that play an elementary role in DevOps.
Tags : 
    
Infosys
Published By: Talend     Published Date: Nov 02, 2018
The rise of data privacy regulations and the increasing risk of data theft have made data protection an essential part of any data-driven strategy. This executive summary gives you a quick overview of the risks and regulations related to data privacy, and a framework for addressing both without compromising on customer experience.
Tags : 
    
Talend
Published By: Talend     Published Date: Nov 02, 2018
Siloed data sources, duplicate entries, data breach risk—how can you scale data quality for ingestion and transformation at big data volumes? Data and analytics capabilities are firmly at the top of CEOs’ investment priorities. Whether you need to make the case for data quality to your c-level or you are responsible for implementing it, the Definitive Guide to Data Quality can help. Download the Definitive Guide to learn how to: Stop bad data before it enters your system Create systems and workflow to manage clean data ingestion and transformation at scale Make the case for the right data quality tools for business insight
Tags : 
    
Talend
Published By: Talend     Published Date: Nov 02, 2018
Ready to embrace the multi-cloud future? This new TDWI Checklist Report is the cloud primer you’ve been waiting for. The most successful companies are embracing cloud data integration to help them leverage more data. Businesses are increasingly having to learn what data integration is and does as well as increasing their data processing scale and performance at lower cost. This whitepaper demonstrates how to reduce risk and disruption while implementing multi-cloud data integration and self-service data access.
Tags : 
    
Talend
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
What actually is Threat Intelligence? How are other organisations benefiting from it? How can threat intelligence strengthen all the teams in a cybersecurity organization? Find these answers in this book! Offering practical advices that you can dip into as and when you need, so you should feel free to jump straight into the chapter that interests you most. Our hope is that you will begin to see more of the ways that threat intelligence can solve real-world security problems. In this handbook uncover: - The kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges - How security analysts in the real world use threat intelligence to decide what alerts to investigate, what incidents to escalate and what vulnerabilities to patch - How information collected outside of the enterprise can help model risks more accurately and prevent fraud And more
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Feb 13, 2019
There are plenty of misconceptions about what threat intelligence is. The most common (but slightly misguided) assumptions risk leading many security pros to believe that threat intelligence doesn’t have an advantage to bring into their particular role. In this white paper, explore how threat intelligence can be operationalized in a variety of roles, demonstrating the central part it can play in a proactive security strategy. You’ll also uncover: • Key threat intelligence attributes to power vulnerability management • 4 major challenges for incident response teams • 3 threat intelligent commandments • 4 pain points identified by security leaders And more
Tags : 
    
Recorded Future
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.