Find White Papers
Home
About Us
List Your Papers
    
> Technology > Enterprise Applications > Risk Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 126 - 150 of 295Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, financial, quality, risk, management
    
IBM ILOG.
White Paper Published By: IBM Software     Published Date: Nov 04, 2010
Learning from the past is one thing, but when real competitive advantage happens you get it right the first time.
Tags : 
ibm cognos, predictive analytics, enterprise data, risk management, business analytics
    
IBM Software
White Paper Published By: IBM Software     Published Date: Aug 04, 2010
How to manage risk in outsourced applications.
Tags : 
ibm ouncelab, risk, outsourced application, outsourcing application development, security
    
IBM Software
White Paper Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management
    
IBM Software
White Paper Published By: IBM UK - ISM&S Storage     Published Date: Nov 15, 2011
To maintain its position at the forefront of international research, the Institute for Computational Cosmology at Durham University wanted to develop a new high-performance computing cluster - find out how they did it.
Tags : 
super comupter, computations, cosmology, delivery, infrastructure
    
IBM UK - ISM&S Storage
White Paper Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management
    
IDology
White Paper Published By: IFS     Published Date: Aug 10, 2011
How Engineer, Procure, Construct, Install (EPCI, EPC) can identify technology designed to manage risk across design, fabrication and construction activities.
Tags : 
ifs, erp, epci, contracting business, epc
    
IFS
White Paper Published By: Infor     Published Date: Jul 23, 2007
Make EAM part of your Green Strategy; This white paper includes recommendations for a Green-centric Organization. Find out how a comprehensive, green-oriented asset performance management solution will enable you to achieve compliance, efficiency, and consumer appeal.
Tags : 
environment, environmental, social responsibility, greenhouse, greenhouse effect
    
Infor
Webinar Published By: Intel     Published Date: Aug 10, 2012
Remote computer repair is easier with Intel® CoreT vProT technology. IT professionals can remotely diagnose and repair PCs to get users back to work fast
Tags : 
remote repair, it management, operatin systems, pc repair, enterprise security
    
Intel
White Paper Published By: Intel Security     Published Date: Feb 23, 2015
This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem
    
Intel Security
White Paper Published By: Intellitactics     Published Date: Feb 28, 2008
Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.
Tags : 
siem, intellitactics, compliance, security management, risk management
    
Intellitactics
White Paper Published By: Kaspersky Lab     Published Date: Dec 12, 2014
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part II: Reducing Mobile, Web, and Social Media Risks.
Tags : 
kaspersky, it security, best practice, hygiene, sensitive information
    
Kaspersky Lab
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : 
pdf, pdf security, locklizard, software, cost savings
    
LockLizard
White Paper Published By: LogMeIn     Published Date: Jun 23, 2015
This infographic illustrates how SaaS deployment model saves you money.
Tags : 
roi, return of investment, saas, saas deployment model, costs
    
LogMeIn
White Paper Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor
    
LogRhythm
White Paper Published By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system
    
Lumension
White Paper Published By: Lumension     Published Date: Mar 28, 2011
This paper highlights the four steps organizations should take to automate and streamline the patch management process.
Tags : 
lumension, patch management, patch deployment, vulnerability, risk mitigation
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 19, 2010
Finding Ways to Balance IT Risk and Productivity. Learn how to strike a happy balance that allows for the safe use of new technologies - without the risk.
Tags : 
lumension security, consumerized workforce, it risk, productivity, collaborative
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : 
lumension security, patch management, vulnerability management, risk mitigation, best practices
    
Lumension
White Paper Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application
    
Lumension
White Paper Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security
    
Lumension
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
White Paper Published By: MaaS360 by Fiberlink     Published Date: Apr 16, 2015
Android: With each new confectionary code name, Google’s mobile OS makes new strides to remain flexible while making a shell so hard hackers will crack their teeth biting in.
Tags : 
fiberlink, android, mobile users, strategy, app enabled
    
MaaS360 by Fiberlink
White Paper Published By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014
Mobile device Management was just the beginning of the enterprise journey towards complete mobility. Learn why enterprise mobility management is now needed for all devices and data for work.
Tags : 
mobile device management, mobility, enterprise mobility, mobile security, application management
    
MaaS360 by Fiberlink
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search