risk management

Results 1 - 25 of 614Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: IBM     Published Date: May 30, 2018
Security and risk management leaders are implementing and expanding SIEM to improve early targeted attack detection and response. Advanced users seek SIEM with advanced profiling, analytics and response features.
Tags : 
    
IBM
Published By: NAVEX Global     Published Date: Apr 20, 2018
Learn everything you need to know about effectively managing your third party risk-from defining a due diligence process to creating risk-based strategy-in our comprehensive guide. What you'll learn: -How to define your goals and create a strategy -How to manage your third-party risk management programme -How to track and improve your programme's effectiveness
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 20, 2018
An effective third party risk management program is in the interest of all organizations—regardless of size, industry, and number of third party providers. This report will help you benchmark your third party risk management program and its performance against trends in the market and best practices. What you'll learn: The top issues and challenges organizations are facing with their third party risk management programs How organizations are using outside providers to help with third party due diligence The inconsistency of top concerns year over year and what this might indicate How to leverage the findings in this benchmark report to increase program effectiveness in your own organization
Tags : 
    
NAVEX Global
Published By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
    
Kronos
Published By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Safety is a top priority for companies with a fleet of drivers and vehicles. It starts with hiring and screening new employees with safe driving records and qualifications. You may even have written safety policies. However, having visibility into your driver’s whereabouts and their behaviors behind the wheel is key in identifying and preventing risks before it costs your business. Do you wish that you could sit in the passenger seat of every vehicle in your fleet to watch driver behavior? With data-driven fleet safety management software from Silent Passenger you can. According to NHTSA, the cause of 94% of collisions is driver error. By monitoring unsafe driver behaviors such as speeding, hard braking, and fast acceleration is key to preserving fleet safety. A reliable fleet safety management software delivers key business intelligence that helps maintain fleet efficiency and productivity on the road. Improve Safety and Reduce Operational Costs Running a safer fleet can have a signif
Tags : 
    
Vehicle Tracking Solutions
Published By: iShares by BlackRock     Published Date: Apr 19, 2018
In this paper, we examine the evolution of the bond market through three interconnected lenses: the liquidity environment, market structure and product preferences. By submitting this form you agree to share your contact information with BlackRock and to follow-up communication. Investing involves risk, including possible loss of principal. Prepared by BlackRock Investments, LLC. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. BlackRock, Inc. is not affiliated with The Economist. 483635
Tags : 
ishares, bonds, bond market, liquids, risk management, fixed income/bonds, financial advisors, capital, finance
    
iShares by BlackRock
Published By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: IBM     Published Date: May 08, 2018
Internally developed software applications support the most sensitive and strategically important business processes of most enterprises. Yet application security is one of the most neglected fields of cybersecurity.
Tags : 
application security, software applications, cybersecurity
    
IBM
Published By: IBM     Published Date: May 08, 2018
Security testing is growing faster than any other security market, as AST solutions adapt to new development methodologies and increased application complexity. Security and risk management leaders must integrate AST into their application security programs.
Tags : 
application security, ast solutions, security management, risk management
    
IBM
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect, security, backup and recovery, best practices
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, it management, storage, best practices
    
Commvault
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell™ One Identity Privileged Password Manager and Privileged Session Manager from Dell Software, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, privileged accounts, priviliged passwords, civilian agencies, dell, dell privileged session manager, dell security
    
Dell Security
Published By: Dell Security     Published Date: Mar 29, 2016
With Dell One Identity Privileged Password Manager and Privileged Session Manager, managing privileged passwords is easy and far more secure. This white paper explains how.
Tags : 
risk management, dell, dell privileged session manager, privileged passwords, two-factor authentication
    
Dell Security
Published By: TriNet     Published Date: Jun 13, 2011
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
trinet, entrepreneur, peo, professional employer organization, smb, human resources, co-employment, talent market, due diligence, company risk, asset management, benefits
    
TriNet
Published By: SAP     Published Date: May 03, 2016
Managing risk has never been so important for businesses, nor has it been so difficult. New globalresearch commissioned by SAP has revealed that an increasingly complex business and risk environment is severely challenging companies.
Tags : 
sap, risk, management, complexity, business, enterprise applications, data management
    
SAP
Published By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit, enterprise applications
    
Oracle
Published By: SAP     Published Date: Nov 16, 2017
Explore how SAP HANA Enterprise Cloud empowers business and IT operations to unlock the full value of the SAP HANA platform in the cloud. See how our end-to-end, privately managed cloud solution delivers a comprehensive, coordinated application landscape and suite of managed services.
Tags : 
    
SAP
Published By: FICO     Published Date: May 11, 2017
Agencies have long provided telecommunications companies with scalability for collections in a high-growth industry. Today, with markets and business models changing, your collections agencies have a growing impact — for good or ill — on your success.
Tags : 
customer experience, analytics, risk management, customer interaction service, customer relationship management, customer satisfaction, customer service, finance
    
FICO
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle CX
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Dell     Published Date: Feb 04, 2016
Older PCs are a risk due to a lack of robust hardware-based security, older processors, and outdated operating systems. This Cheat Sheet paper discusses the points you should consider when selecting notebooks and laptops for your mobile and remote workforce. Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
Tags : 
hardware, tpm, it security, windows, telecommunication, byod
    
Dell
Published By: TriNet     Published Date: Aug 03, 2012
In this eGuide, you'll learn about ten foundational risks that small and growing companies face and how those risks can be minimized or even eliminated.
Tags : 
entrepreneurship, human resources, managing risk, compliance, risk management
    
TriNet
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.