Find White Papers
Home
About Us
List Your Papers
    
> Technology > Enterprise Applications > Risk Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Risk Management

Risk Management is the process of measuring, or assessing risk and developing strategies to manage it. Strategies include transferring the risk to another party, avoiding the risk, reducing the negative effect of the risk, and accepting some or all of the consequences of a particular risk. Traditional risk management focuses on risks stemming from physical or legal causes.
Results 51 - 75 of 307Sort Results By: Published Date | Title | Company Name
White Paper Published By: EMC     Published Date: Oct 12, 2015
This white paper highlights the extended collaboration issues commonly experienced companies in the energy and engineering industries.
Tags : 
collaboration, security risk, public cloud architecture, share documents, supplier exchange
    
EMC
White Paper Published By: EMC Corporation     Published Date: Mar 20, 2014
The top five questions to ask regarding Identity and Access Management.
Tags : 
emc, iam, strategic solutions, access reviews, access request
    
EMC Corporation
White Paper Published By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showcasing the differences in the lives of Managers with RSA's Averska IAM and without IAM.
Tags : 
emc, rsa averska, iam, strategic solutions, access reviews
    
EMC Corporation
White Paper Published By: EMC Corporation     Published Date: Mar 20, 2014
An infographic showing the benefits of an RSA Averska IAM Solution.
Tags : 
emc, rsa averska, iam, strategic solutions, access reviews
    
EMC Corporation
White Paper Published By: EMC Corporation     Published Date: Nov 08, 2011
This paper will discuss how the GDA enables several levels of consolidation from local backup to multi-site DR.
Tags : 
gda, consolidation, backup, multi-site, deduplication
    
EMC Corporation
White Paper Published By: Epicor     Published Date: Apr 01, 2009
This white paper presents a low risk, high impact approach to gaining control of regulatory compliance. The procedures, tasks, and behaviors that bear upon compliance can be overwhelming.
Tags : 
epicor, grc, governance risk and compliance, supply chain visibility, erp solutions
    
Epicor
White Paper Published By: FICO     Published Date: Nov 03, 2015
Using predictive models.
Tags : 
model, risk governance, management, analytics, optimization
    
FICO
White Paper Published By: FICO     Published Date: Nov 03, 2015
Critical to proper execution.
Tags : 
strategic, enterprise, risk, compliance, best practices
    
FICO
White Paper Published By: FICO     Published Date: Nov 03, 2015
Examines the issues surrounding the effectiveness of related programs and practices across the financial sector.
Tags : 
best practices, business analytics, business intelligence, risk management
    
FICO
White Paper Published By: FICO     Published Date: Nov 03, 2015
Meet banking model regulations without killing your analytic's team's productivity.
Tags : 
best practices, business intelligence, business management, risk management
    
FICO
White Paper Published By: Focus     Published Date: Nov 15, 2011
When it's time to expand your network, this guide will help you evaluate the needs of your organization and enable you to provide best performance for mission-critical applications.
Tags : 
network, infrastructure, best practices, mission critial, applications
    
Focus
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal
    
ForeScout
White Paper Published By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : 
emerging trends, emerging technologies, hype cycle, new technologies, it trends
    
Gartner, Inc
White Paper Published By: Gates     Published Date: Aug 12, 2011
Field redesigns point the way to next-generation machines. This paper includes case studies showing how conversions from roller chain or gears to synchronous belt drives improved performance while saving maintenance and replacement costs.
Tags : 
gates, power transmission, engineering, oe manufacturing, field retrofits
    
Gates
White Paper Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl
    
GeoTrust
White Paper Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance
    
GFI
White Paper Published By: GFI     Published Date: Jul 09, 2007
This white paper highlights why organizations need to implement event log auditing as an integral part of their security policy to meet industry standards such as the Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
security software, pci, payment card, credit card, compliance
    
GFI
White Paper Published By: Gomez IT     Published Date: May 23, 2011
Everyone wants more traffic to their web site, right? What happens if the investments you make to drive traffic to your site result in reduced revenue? Continue reading to learn more about how important web load testing is.
Tags : 
gomez, web performance testing, web load testing program, compuware, web application delivery
    
Gomez IT
White Paper Published By: GoToMyPC     Published Date: Apr 06, 2011
This Forrester white paper examines the rise in IT's prioritization of business continuity and disaster recovery (BC/DR) planning.
Tags : 
disaster recovery, business continuity, bc/dr, smbs, enterpriser risk management
    
GoToMyPC
White Paper Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management
    
Guardian Digital
White Paper Published By: HP and AMD     Published Date: Nov 16, 2011
This Technology Spotlight discusses the changing nature of IT and how blade server technology combined with virtualization is becoming the foundation of the distributed IT environment.
Tags : 
blade servers, virtualization, blade, server sprawl, infrastructure
    
HP and AMD
White Paper Published By: HP and AMD     Published Date: Nov 16, 2011
With the launch of its new Data Center Smart Grid, HP continues to push the boundaries of what its technology can deliver. Find out more now!
Tags : 
data center, tco, total cost of ownership, power and cooling, cool
    
HP and AMD
White Paper Published By: IBM     Published Date: Jun 16, 2015
Read the white paper to learn how to put a plan in place for full functional validation, and get details on the importance of validating resiliency in a live environment; learn why small-scale recovery “simulations” are inadequate and misleading.
Tags : 
enterprise, cloud computing, data centers, cloud-based solutions, it solutions
    
IBM
White Paper Published By: IBM     Published Date: Jun 16, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
enterprise infrastructure, big data, mobility, data center, it infrastructure
    
IBM
White Paper Published By: IBM     Published Date: Apr 15, 2015
Technology Adoption Analyst whitepaper by Forrester. This IBM-commissioned profile of IT operations decision-makers at enterprise companies in the US, UK and Germany evaluates IT operations analytics adoption, benefits, and challenges based on Forrester’s own market data and a custom study of the same audience.
Tags : 
ibm, it operations, decision makers, analytics, market analysis
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search