mitigate

Results 151 - 175 of 266Sort Results By: Published Date | Title | Company Name
Published By: Wyng     Published Date: Jan 13, 2016
The explosion of User Generated Content, or UGC, has drastically shifted the way people interact with brands. And as brands turn to UGC in place of their brand produced content, there are new risks that come with the rewards. To help mitigate these potential legal issues, we have developed a guide with everything you need to know about rights management.
Tags : 
    
Wyng
Published By: Optis     Published Date: Jun 08, 2015
This e-book offers seven steps to ensure that your organization avoids the dangers of hidden rocks and currents that swirl around ADA accommodations compliance: efficiently and accurately track, manage, and document your accommodation process to mitigate compliance risk and eliminate employee grievances.
Tags : 
ada, adaaa, ada compliance, employee ada accommodation, human resources
    
Optis
Published By: Staples     Published Date: May 02, 2017
Dealing with the office bully is not as easy as dealing with a playground bully, but here are some strategies to help navigate being pushed into doing jobs that are not your responsibility, taking on too much, or simply being treated disrespectfully. Get this article to learn: How to identify bullying in the workplace Ways to control and mitigate disrespectful interactions Learn when to document, discuss, & elevate your concerns Everyone has the right to a respectful and positive working environment. Maybe someone should tell the office bully that.
Tags : 
office bully, positive work environment, safe workspace, office conflicts, office manager, administrative assistant
    
Staples
Published By: UPS     Published Date: Aug 29, 2017
Manufacturers who want to link machines, sensors, processes, and people together face a daunting challenge. Here are three things that can help you improve supply chain visibility, mitigate risk and grow into new markets.
Tags : 
ups, industrial buying dynamics, industrial distribution, industrial products, industrial products wholesale
    
UPS
Published By: Eaton     Published Date: Jul 12, 2019
The production of counterfeit products is an increasing problem that affects the entire electrical industry. Counterfeit protective devices, like circuit breakers, including GFCI and AFCI for personal protection, pose one of the most significant risks to facility and employee safety. Because counterfeit products are more difficult to detect than ever, we as an industry must do more to guard against their risks and liabilities. By purchasing products from authorized resellers and using available tools to authenticate products, buyers can ensure a safer supply chain that mitigates the risk sub-standard and counterfeit electrical safety devices pose.
Tags : 
    
Eaton
Published By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
    
Code42
Published By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : 
ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security, application security
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Explore a topic often overlooked during discussions about data security: the risk of insider threats. This report, "Stopping insider attacks: how organizations can protect their sensitive information," provides an overview of the issue of insider attacks and offers suggestions that may help organizations mitigate their risk. Plus, listen to a podcast about stopping insider threats.
Tags : 
sensitive information, ibm, personal data privacy, global business security, threats, malware, insider attacks, anti spyware
    
IBM
Published By: Inovis     Published Date: Aug 21, 2007
Business Community Management is a strategic vision that creates a comprehensive view of the supply chain by integrating the technology, business processes and communication of the entire business community to facilitate end-to-end supply chain visibility. This white paper will examine the current state of B2B communication; detail the steps needed to mitigate the challenges created by B2B; and more.
Tags : 
vendor management, supplier, suppliers, supplier relationship management, inovis, supply chain, supply chain management, scm
    
Inovis
Published By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security
    
Progress Software BTA Telecommunications
Published By: PC Mall     Published Date: Mar 27, 2012
IBM's enterprise content management solutions are designed to help users dramatically reduce the costs associated with producing, storing and retrieving content and can also help mitigate risk associated with managing information appropriately.
Tags : 
ibm, content, content management, reduce, costs, information management, lifecycle, knowledge management
    
PC Mall
Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: CenturyLink     Published Date: Nov 18, 2011
Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
Published By: IBM     Published Date: Aug 07, 2012
Leading companies applying? Predictive intelligence? To proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
Tags : 
combating, combat, risk, predictive, intelligence, companies, applying, proactively
    
IBM
Published By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : 
ibm, technology, predictive operational analytics, spss, business analytics, business intelligence, business management, application integration
    
IBM
Published By: IBM     Published Date: Nov 09, 2012
Many organizations today are introducing additional controls and accountability into management practices to improve governance and mitigate against risk. Read this white paper to learn more about Information governance and auditing with System Z.
Tags : 
ibm, system z, information governance audit, protection, data protection
    
IBM
Published By: Equinix     Published Date: Sep 25, 2012
Issues of performance, security and compliance requirements are critical when developing cloud services.
Tags : 
cloud computing, security, compliance, equinix
    
Equinix
Published By: CDW     Published Date: Apr 04, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, application performance management, business management, information management
    
CDW
Published By: Paycor     Published Date: Jun 05, 2014
Did you know that a study shows that almost 39 percent of franchise businesses fail after four years? Or that defaults on loans in the early 2000s were higher for franchised businesses than for independents? Is your business at risk of becoming such a statistic? Staying on top of changes to tax laws and health care reform can be overwhelming. This whitepaper will empower you to mitigate risk and ensure your franchise’s profitability.
Tags : 
franchise, compliance, labor law, wage and hour, tax law, healthcare reform, enterprise applications
    
Paycor
Published By: Paycor     Published Date: Jun 05, 2014
Did you know the Department of Labor assessed $82 million in penalties in 2013? Misclassified employees, lack of documentation, payroll errors and employment discrimination lawsuits add up to costly mistakes for healthcare organizations every day. If you’re using spreadsheets to track employee data and relying on disconnected information systems, your organization is at risk of becoming a statistic. This whitepaper will empower you to mitigate risk and ensure your organization can continue to serve its mission.
Tags : 
healthcare, compliance, labor law, wage and hour, tax law, healthcare reform
    
Paycor
Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security, security, enterprise applications
    
BitSight Technologies
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, it management, knowledge management, data management
    
CDW-HPE Servers
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.