Find White Papers
Home
About Us
List Your Papers
    
> Technology > Enterprise Applications > Risk Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 101 - 125 of 252Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM Business Analytics     Published Date: Jun 23, 2011
David Axson, author of The Management Mythbuster, explains how insightful analytics and a systematic approach to risk management can drive dramatic improvements in the quality and value that finance organizations deliver.
Tags : 
ibm business analytics, david axson, enterprise risk management, erp, enterprise resource planning
    
IBM Business Analytics
White Paper Published By: IBM Business Analytics     Published Date: Mar 04, 2011
Download this paper written by BPM partners to see how the 'last mile' has become a very complex and challenging process for companies and their CFO's and the strategic need to automate the controls around these processes.
Tags : 
bpm partners, last mile, finance, finance automation, risk
    
IBM Business Analytics
White Paper Published By: IBM Corp     Published Date: May 31, 2011
This paper explains virtualization, its benefits for mid-sized business and how IBM's virtualization strategy can help mid-sized companies reduce costs, improve services and simplify management.
Tags : 
ibm virtualization, mid-sized businesses, ibm solutions, virtualized infrastructure, system x
    
IBM Corp
White Paper Published By: IBM ILOG.     Published Date: Oct 26, 2009
Find out how the role technologies such as Business Rule Management Systems (BRMS) and Optimization software will play in helping Healthcare organizations of all types and sizes build smarter processes that allow you to adapt to change faster, overcome process silos and improve patient care and safety.
Tags : 
ibm, ilog, healthcare, productivity, business rule management systems
    
IBM ILOG.
White Paper Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, financial, quality, risk, management
    
IBM ILOG.
White Paper Published By: IBM Software     Published Date: Nov 04, 2010
Learning from the past is one thing, but when real competitive advantage happens you get it right the first time.
Tags : 
ibm cognos, predictive analytics, enterprise data, risk management, business analytics
    
IBM Software
White Paper Published By: IBM Software     Published Date: Aug 04, 2010
How to manage risk in outsourced applications.
Tags : 
ibm ouncelab, risk, outsourced application, outsourcing application development, security
    
IBM Software
White Paper Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management
    
IBM Software
White Paper Published By: IBM UK - ISM&S Storage     Published Date: Nov 15, 2011
To maintain its position at the forefront of international research, the Institute for Computational Cosmology at Durham University wanted to develop a new high-performance computing cluster - find out how they did it.
Tags : 
super comupter, computations, cosmology, delivery, infrastructure
    
IBM UK - ISM&S Storage
White Paper Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management
    
IDology
White Paper Published By: IFS     Published Date: Aug 10, 2011
How Engineer, Procure, Construct, Install (EPCI, EPC) can identify technology designed to manage risk across design, fabrication and construction activities.
Tags : 
ifs, erp, epci, contracting business, epc
    
IFS
White Paper Published By: Infor     Published Date: Jul 23, 2007
Make EAM part of your Green Strategy; This white paper includes recommendations for a Green-centric Organization. Find out how a comprehensive, green-oriented asset performance management solution will enable you to achieve compliance, efficiency, and consumer appeal.
Tags : 
environment, environmental, social responsibility, greenhouse, greenhouse effect
    
Infor
Webinar Published By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : 
remote repair, it management, operatin systems, pc repair, enterprise security
    
Intel
White Paper Published By: Intellitactics     Published Date: Feb 28, 2008
Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.
Tags : 
siem, intellitactics, compliance, security management, risk management
    
Intellitactics
White Paper Published By: Kaspersky     Published Date: Feb 14, 2014
In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
Tags : 
kaspersky, security, it security, data protection, intrusion detection
    
Kaspersky
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : 
pdf, pdf security, locklizard, software, cost savings
    
LockLizard
White Paper Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor
    
LogRhythm
White Paper Published By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system
    
Lumension
White Paper Published By: Lumension     Published Date: Mar 28, 2011
This paper highlights the four steps organizations should take to automate and streamline the patch management process.
Tags : 
lumension, patch management, patch deployment, vulnerability, risk mitigation
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 19, 2010
Finding Ways to Balance IT Risk and Productivity. Learn how to strike a happy balance that allows for the safe use of new technologies - without the risk.
Tags : 
lumension security, consumerized workforce, it risk, productivity, collaborative
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : 
lumension security, patch management, vulnerability management, risk mitigation, best practices
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application
    
Lumension
White Paper Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security
    
Lumension
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search