Find White Papers
Home
About Us
List Your Papers
    
> Technology > Enterprise Applications > Risk Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 201 - 225 of 238Sort Results By: Published Date | Title | Company Name
White Paper Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment
    
Shavlik Technologies
White Paper Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus
    
Shavlik Technologies
White Paper Published By: Skillsoft     Published Date: Apr 01, 2011
In this report, we will take a look at the IT-related activities from the ITPro and AnalystPerspectives collections, as well as the most popular IT and business search terms.
Tags : 
analystperspectives, itpro, books24x7, cloud computing, mobile computing
    
Skillsoft
White Paper Published By: Solidcore     Published Date: Jan 07, 2008
Identifying critical change control failure points in your infrastructure can help reduce the threat of costly downtime, potential security breaches, and compliance weaknesses. Read this paper for guidelines on how to identify and categorize systems that have characteristics which heighten risk.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability
    
Solidcore
White Paper Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
When it comes to data protection and recovery, many businesses are not as safe as they believe. Read on to find out what you should consider when creating your backup and disaster recovery plan.
Tags : 
storagecraft, recovery, backup, cloud, strategies
    
StorageCraft® Technology Corporation
White Paper Published By: Stratus Technologies     Published Date: Dec 01, 2008
Certainly server virtualization offers an elegant way to minimize planned downtime during routine software and hardware maintenance, or scheduled upgrades. But that addresses only part of the availability story.
Tags : 
stratus technology, server virtualization, virtual machine, automated software, data centers
    
Stratus Technologies
White Paper Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices
    
Stratus Technologies
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Most organizations today understand that a disaster recovery (DR) plan is essential to their continued survival should a natural disaster occur. But implementing a DR plan entails substantial time, effort and cost - not to mention significant investment in developing new areas of technical expertise within the organization. As a result, many organizations are turning to disaster recovery service providers (DRSPs) to offload their disaster recovery operations.
Tags : 
sungard, recovery, service, organizations, disaster
    
SunGard
White Paper Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.
Tags : 
sungard, sungard availability services, disaster recovery, it recovery, data loss protection
    
SunGard Availability Services
White Paper Published By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : 
sybase, powerbuilder, data, development, applications
    
Sybase PowerBuilder
White Paper Published By: Symantec     Published Date: Apr 09, 2012
Download this guide to help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Download this survey now to understand the attitudes and practices of SMBs toward disaster preparedness.
Tags : 
symantec, smb, disaster prepardness survey, backup and recovery, data protection
    
Symantec
White Paper Published By: Symantec.cloud     Published Date: Nov 14, 2011
This paper discusses the many drivers for organizations looking to move email to the cloud and highlights the shortcomings of some of these solutions.
Tags : 
host, hosted email, security, compliance, redundancy
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 28, 2011
This white paper discusses how SaaS can simplify IT management.
Tags : 
symantec.cloud, it security management, saas, risk prevention, security
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 18, 2011
This white paper focuses on the critical need to manage outbound content sent via various avenues including email, Instant Messages, text messages, tweets, and Facebook posts.
Tags : 
symantec cloud, outbound content management, email, messaging, risk mitigation
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Nov 29, 2010
Read the latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : 
messagelabs us, it security, smb, risk management, protection
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Aug 10, 2010
Off-the-shelf instant messaging (IM) lets malware into the Enterprise, and compromises regulatory compliance and copyright protection. Find out how a secure IM service can keep you covered.
Tags : 
messagelabs us, instant messaging, malware, information mobile worker, saas
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Apr 27, 2010
Our latest research uncovers the legal risks from employee use of the email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Feb 12, 2010
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
Tags : 
messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment
    
Symantec.cloud
White Paper Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers
    
Technolytics
White Paper Published By: TIBCO     Published Date: May 15, 2013
Integration may not be new, but its role has drastically changed. Once used simply for support, it is now an enabler – serving as an indispensable foundation critical to achieving agility, efficiency, and growth. Done well, it can drive better business decisions, more cost-effective operations, and be the catalyst for competitive advantage. Architected without a clearly defined strategy, however, integration will fail to deliver on its promise. What are some of the pitfalls you can avoid when augmenting an existing infrastructure to maximize performance, results, and success? Read on.
Tags : 
integration, infrastrucutre, performance, enterprise, efficiency
    
TIBCO
White Paper Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes
    
Trillium Software
White Paper Published By: Tripwire     Published Date: Oct 14, 2010
Meet this data protection challenge head on with a new way to categorize sensitive data that helps you reduce data breach risk and take more control of your most critical assets. Discover how.
Tags : 
tripwire, data protection, data breach risk, threats, compliance
    
Tripwire
White Paper Published By: Tripwire     Published Date: Apr 21, 2010
Running scared from an upcoming PCI audit? There's a better way. It's called continuous compliance built directly into every day operations. The result is a virtual elimination of costly (not to mention scary) fire drills, even as credit card standards continue to evolve.
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management
    
Tripwire
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      
Madison Logic