reduce risk

Results 151 - 175 of 373Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky     Published Date: Feb 05, 2015
This guide provides information on how to reduce risk in today's IT environment.
Tags : 
reduce risk in it environment, it environment security, data security breach prevention, preventive measures for data security
    
Kaspersky
Published By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : 
benefits to enterprise it security, exploit prevention, protection from exploits, software attacks
    
Kaspersky
Published By: BMC Software     Published Date: Jul 01, 2011
All SaaS help-desks are not created equally. From basic ticket logging to full-featured, enterprise-grade service management solutions, there truly is something for everyone. Learn more about the key factors in deciding between a comprehensive or a slimmer selection for your organization.
Tags : 
saas, help desk software, bmc, it helpdesk, helpdesk system, cloud based help desk, simple, affordable, bmc software, drive profit, reduce risk
    
BMC Software
Published By: BMC Software     Published Date: Jul 01, 2011
You can implement help desk processes based on ITIL easily with reduced up-front costs and automatic upgrades.  Used by more than 72,500 companies worldwide, the Force.com platform is the most widely used Cloud platform in the world.  Gain insights into the benefits of running your help desk in the cloud. Download this BMC Software white paper from Web Buyer's Guide to learn about a faster, more cost-effective, ITIL-based help desk solution than ever before possible
Tags : 
itil, help desk software, bmc, cloud based help desk, simple, affordable, bmc software, drive profit, reduce risk
    
BMC Software
Published By: BMC Software     Published Date: Jul 01, 2011
Help Desk software as a service is attractive to many IT departments. It offers the same benefits of traditional IT help desk solutions, in addition to reducing capital expenses, accelerating implementation, and providing easier upgrades. This paper explores considerations for implementing IT service management in-house or as a service.
Tags : 
service management, bmc software, itil, saas, help desk software, delivery model, cloud based help desk, simple, affordable, bmc, drive profit, reduce risk, paul avenant
    
BMC Software
Published By: HP     Published Date: Jul 29, 2008
This white paper looks at HP's approach to Data Center Transformation and how it can help enterprise data centers reduce costs, manage risks, and support business growth. Learn about the 4 key factors which should influence your data center transformation strategy. See first hand how HP embarked on a three-year transformation program for its own data centers. This ambitious program involved rationalizing 85 data centers into just six global ones- with tangible and measurable benefits.
Tags : 
network management, data center, datacenter, mission critical
    
HP
Published By: ParAccel     Published Date: Oct 22, 2010
This white paper outlines these challenges and provides a clear path to providing the accelerated insight needed to perform in today's complicated business environment to reduce risk, stop fraud and increase profits.
Tags : 
paraccel, financial services, macroeconomic risk, fraud, analytic database, performance
    
ParAccel
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption, vulnerability
    
CREDANT Technologies
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
    
CREDANT Technologies
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: Citrix Systems     Published Date: Sep 06, 2013
Regain control and reduce risk without sacrificing business productivity and growth.
Tags : 
citrix, security, desktop virtualization, strengthen information, reduce risk
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 06, 2013
Empowering Information Security with Desktop Virtualization
Tags : 
citrix, security, desktop virtualization, strengthen information, reduce risk, byod
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 27, 2014
New ways of working call for new ways of managing risk. Mobility, flexwork, bring-your-own device (BYOD) and increased collaboration across organizations have changed the risk profile and undermine existing IT architectures. The challenge is to allow people the flexibility they need for optimal business productivity while ensuring the security and compliance required by the enterprise. This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
Tags : 
citrix, information security, desktop virtualization, virtualization
    
Citrix Systems
Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention, skillsoft, human resources, corporate counsel
    
Skillsoft
Published By: Attachmate     Published Date: Mar 20, 2013
Insider threats continue to challenge organizations, particularly as BYOD brings complexity to enterprise risk management. The latest Ponemon research highlights recent trends, risk factors and what organizations need to do now to reduce risk.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management, fraud management, fraud management tools, fraud detection software, enterprise risk management, attachmate luminet, compliance audit, failed compliance audit
    
Attachmate
Published By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : 
mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : 
best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases
    
McAfee
Published By: Tidemark     Published Date: Feb 24, 2014
Learn how to improve your decision making, reduce risk and enhance business performance to maximize the efficiency of your organization.
Tags : 
cfo, business transformation, decision making, reduce risk, business performance, efficiency, finance, asset management, financial advisors, capital, benefits, technology
    
Tidemark
Published By: AWS     Published Date: Jul 29, 2019
What you'll learn in this webinar: Optimize your operations by taking advantage of the modern, scalable cloud infrastructure available on Amazon Web Services (AWS). Migrate your Oracle applications and databases to AWS and get all the benefits of the cloud. Migrating mission-critical Oracle databases and applications to the cloud is complex and you may feel locked into your platform. Amazon Aurora provides commercial-grade database performance and availability at a fraction of the cost. Apps Associates—an AWS Partner Network (APN) Partner and Oracle expert—can migrate enterprise workloads to the cloud, freeing customers to focus on higher-value initiatives. Watch this webinar to learn how to: Run your entire Oracle database and application environment on the cloud Take advantage of lower IT costs on the cloud and reduce your Total Cost of Ownership (TCO) Leverage Amazon Aurora to help satisfy your company’s cloud-first mandate, improve security, and reduce risk
Tags : 
    
AWS
Published By: Veeam '18     Published Date: Dec 04, 2018
"Ransomware is top of mind for many organizations’ leaders as their organizations face the potentially disastrous aftermath of successful attacks. ESG has surveyed IT leaders and organizations to find out how big of a problem ransomware is, what are the business consequences of downtime caused by these attacks, and which are some of the best practices and capabilities organizations need to apply to be protected. According to the ESG research, nearly two-thirds of surveyed organizations across North America and Western Europe experienced a ransomware attack at some point last year, with 22% reporting weekly attacks. The attacks have helped make cybersecurity a target of IT investment, and spending is accelerating. What’s needed to fend off this epidemic are best practices and tools to: Prevent or at least mitigate attacks Protect data and backup data Recover reliably"
Tags : 
    
Veeam '18
Published By: Talend     Published Date: Nov 02, 2018
Ready to embrace the multi-cloud future? This new TDWI Checklist Report is the cloud primer you’ve been waiting for. The most successful companies are embracing cloud data integration to help them leverage more data. Businesses are increasingly having to learn what data integration is and does as well as increasing their data processing scale and performance at lower cost. This whitepaper demonstrates how to reduce risk and disruption while implementing multi-cloud data integration and self-service data access.
Tags : 
    
Talend
Published By: Citrix Systems     Published Date: Nov 13, 2018
Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: -Increase IT efficiency -Reduce security risks -Free IT staff to focus on more strategic initiatives
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Whether your organization is going all in on cloud or they have a more conservative approach, the undeniable reality is that workloads are moving to the cloud at warp speed. And with many IT leaders concerned that the complexity of the network hampers their organization's ability to migrate apps to the cloud, it's up to you to transform the network to meet the new demands. Read this e-book to learn how a unified app-delivery strategy can help you: - Increase IT efficiency - Reduce security risks - Free IT staff to focus on more strategic initiatives"
Tags : 
    
Citrix Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.