levels risk

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Published By: KPMG     Published Date: Jun 10, 2019
A supplier partnership model delivers greater levels of innovation than traditional transaction methods. Here’s how to get started. Read this insight to discover: • key steps for building strong supplier relationships • potential risk areas that must be managed • why behaviour change is as important as processes and tools • why aligning your own organisation is essential.
Tags : 
    
KPMG
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing, application performance management, software testing
    
CA Mainframe
Published By: UL     Published Date: Sep 12, 2018
Performance textiles and fabrics are rapidly bringing apparel and footwear products into the 21st century. Manufacturers today are innovating at breakneck speed and bringing to the market synthetic textiles and fabrics with enhanced performance characteristics, or that feature embedded fibers or topical applications. This has led to the widespread introduction of advanced performance apparel and footwear that offer you new levels of comfort and safety. At the same time, sorting through claims regarding the performance characteristics of these advanced textiles and fabrics can present real challenges for manufacturers, retailers and you. At a minimum, the myriad of vague, conflicting or unsubstantiated marketing claims and characterizations used to promote these materials often result in frustration and disappointment. And fraudulent representations can unnecessarily expose apparel manufacturers and retail buyers to potentially hazardous chemicals and other risks.
Tags : 
    
UL
Published By: Schneider Electric     Published Date: May 20, 2019
Keeping aging switchgear performing at optimum performance levels can be challenging. When it comes to the reliability of an electrical distribution system, it’s not a question of if a system component will malfunction, but when. Electrical equipment ultimately degrades and reaches the end of its useful life, no matter how much maintenance is performed. And, with the advancements in the design of the new circuit breakers, those with older technology are no longer considered sustainable solutions. Plant managers and engineers must ensure continuity of operations and develop a plan to replace or upgrade aging switchgear. Facilities without a properly-implemented strategy put operations at risk that could lead to safety issues, equipment damage and/or downtime.
Tags : 
modernization, electrical distribution system, schneider electric
    
Schneider Electric
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: Secureworks     Published Date: Oct 04, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organization’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
    
Secureworks
Published By: Veritas     Published Date: May 12, 2016
This inforgraphic highlights that a ‘store everything’ hoarding culture is forming ‘databergs’: where masses of unstructured, irrelevant, unseen or unclassified data is growing daily with no notion of slowing down. They conceal a threat ‘below the waterline’ that adds significant levels of risk and cost to organisations. And this risk is rising.
Tags : 
    
Veritas
Published By: Bloomberg     Published Date: Nov 29, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : 
bloomberg, open symbology, market identifiers, financial instruments, analytics, business intelligence, marketing, capital, taxes, benefits, technology
    
Bloomberg
Published By: Bloomberg     Published Date: Dec 14, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : 
bloomberg, open symbology, market identifiers, financial instruments, analytics, marketing, capital, taxes, benefits, technology
    
Bloomberg
Published By: MeQuilibrium     Published Date: Aug 01, 2019
No matter how you slice it, the most important thing businesses can do in turbulent times is increase their ability to adapt to change. Experts call this agility. What many experts leave out, however, is that agility alone is not enough. Employees need resilience too. Our research shows six personas hidden in almost every workforce — based on an employee’s levels of agility and resilience — and how to help each one manage stress amid change. In this e-book, you’ll discover that one persona in particular has a higher risk of burnout than all the others and for one reason: These employees are high in agility but low in resilience. In this e-book, we’ll take a look at these personas to help you see who’s who in your organization and: • Better understand your workforce • See how many of your people are affected by change • Provide strategies for those who are stressed and burned out Help your people with what’s affecting their work and personal lives by analyzing these six workplac
Tags : 
    
MeQuilibrium
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning
    
Selligent Marketing Cloud
Published By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : 
cloud, cloud security, efficiency, security, public cloud
    
F5 Networks Inc
Published By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : 
hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods, right sizes, computer networks and subsystems, uninterruptible power supplies, ups, telecommunications equipment, data center dilemma, total cost of ownership, tco, always-on applications, redundant mep, multi-tiered (pod), monolithic tier
    
HP Data Center
Published By: FICO     Published Date: Nov 10, 2015
"ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions. Learn more on how FICO Blaze Advisor helped ACG Michigan automate its underwriting About FICO FICO (NYSE: FICO), formerly known as Fair Isaac, is a leading analytics software company, helping businesses in 90+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. The company's groundbreaking use of Big Data and mathematical algorithms to predict consumer behavior has transformed entire industries. FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimiz
Tags : 
decision analytics, optimization, profitability, finance
    
FICO
Published By: EMC Corporation     Published Date: Mar 20, 2014
This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be.
Tags : 
emc, incident response, malware detection, security journey, reduce risk, improve security, security, enterprise software
    
EMC Corporation
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment, configuration, monitoring and measurement, monitoring, test and measurement, internet security, security management, risk management, configuration management, vulnerability management
    
Shavlik Technologies
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa, authentication, data protection
    
Aveksa
Published By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Cloud computing has emerged as one of the prevailing IT trends today. By providing greater levels of provisioning and automation, cloud computing can help organizations become more nimble, reduce operating costs, improve application performance, and better allocate their compute resources. It enables organizations to more flexibly scale their IT infrastructure while reducing the administrative burden on IT organizations. But IT departments determined to take advantage of these benefits are at risk of losing control of their infrastructure. Read this white paper to understand how the HP CloudSystem Matrix is an integrated IT infrastructure solution that meets this challenge head-on, enabling organizations to simplify their IT infrastructure, reduce their management burden, and streamline operating costs. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other count
Tags : 
delivering, cloud, integrated infrastructure, hp cloudsystems, operating costs, enabling organizations, it management, knowledge management, enterprise applications, data management
    
Sponsored by HP and Intel®
Published By: Oracle Primavera     Published Date: Oct 09, 2015
As the oil and gas pipeline industry grapples with change at every level — including increasing pipeline operations and expanding regulatory oversight infrastructure —cost savings and operating efficiencies have become more important than ever. Both pipeline operators and contractors can benefit from utilizing EPPM solutions to help them pinpoint the best strategies to develop and implement projects from conception through execution to end game — thereby helping to reduce risk and manage cost. In the end, it’s all about smartly using an approach, such as EPPM solutions, like those from Oracle, to help pipeline operators and contractors reduce costs at the project, portfolio, and enterprise levels through the project lifecycle. The midstream companies that are able to implement the best approach to managing risk to their operations in the most cost - effective way will be the ones to best weather another tumultuous decade to come for the oil and gas industry.
Tags : 
oracle, oil and gas, oil and gas pipeline industry, cost savings, eppm solutions, midstream oil industry, project management, project portfolio management, finance
    
Oracle Primavera
Published By: Webroot Inc     Published Date: Jan 14, 2015
Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions. This paper looks at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
Tags : 
malware prevention, endpoint security, levels of risk, threats, cloud-driven protection, security
    
Webroot Inc
Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.