reduce risk

Results 251 - 275 of 350Sort Results By: Published Date | Title | Company Name
Published By: Neustar Inc.     Published Date: Oct 14, 2013
As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.
Tags : 
digital rights management, ip intelligence, best practices, neutar, security, wireless security, online content, rights, content
    
Neustar Inc.
Published By: IBM     Published Date: Feb 12, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, closing, consolidation, reporting, ccr, close management, financial results, disclosure management, integration, ccr solution, business analytics, data integrity, finance
    
IBM
Published By: Eaton     Published Date: Jan 26, 2016
When working with data center and commercial facility electrical systems, shocks of 100mA to more than 2,000mA are possible—definitely in the realm of serious harm to humans and property. Energized electrical equipment also presents the risk of arc flash caused by electrical faults that produce powerful explosions. When dealing with commercial and industrial electrical systems, such as uninterruptible power systems (UPSs) and their batteries, data center and facilities managers need to be aware of these risks, especially since some repair and maintenance procedures require working with a unit that is still energized. There are ways to minimize the risks to employees, equipment and the field technician performing the service. This paper answers some common questions about UPS maintenance, how to reduce the risks associated with servicing UPSs and batteries, and how to qualify a UPS service provider.
Tags : 
eaton, ups safety, data center, arc flash, energized electrical equipment, facility managers, ups maintenance
    
Eaton
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: IBM     Published Date: Jul 30, 2014
Use this book to understand why integrating and unifying your closing, consolidating, and reporting process is critical. Learn about re-engineering your point solution approach to these activities by investing in integrated solutions. Achieve automation and enhance your ability to manage internal controls, reduce risks, and efficiently create consolidated financial statements and regulatory reports (including XBRL).
Tags : 
ibm, business analytics, finance, closing, consildating, reporting, reporting process, internal control management, risk reduction, consolidation, financial statement consolidation, regulatory reports consolidation
    
IBM
Published By: RPM Direct Marketing     Published Date: Jun 25, 2010
Being successful today and in the future will require a smarter marketing approach. Advertising clutter is at an all-time high and consumers are overwhelmed with thousands of marketing messages every day. There's more and more online and offline messages competing for our limited attention and most of us cannot deal with the tidal wave of advertising aimed in our direction.
Tags : 
rpm, direct marketing, results, roi, rapid performance, marketing message
    
RPM Direct Marketing
Published By: IBM     Published Date: Dec 01, 2014
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
fraud detection, cybercrime, cyber threat, malware
    
IBM
Published By: IBM     Published Date: Feb 24, 2015
Read this report from Forrester Research to learnhow IBM ACM solutions improve the efficiency of knowledge workers, integrate with analytics to create upselling and cross-selling opportunities and reduce the cost and risk of regulatory fines through increased audit consistency.
Tags : 
ibm, acm solutions, cross-selling opportunities, audit consistency
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
Manage identities and access.
Tags : 
management, risk, continuous compliance
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : 
ibm, continuous compliance, reduced risk, security, threat intelligence, iam
    
IBM
Published By: IBM     Published Date: Apr 01, 2016
Discover how to break down IT silos and increase agility for globally and technically diverse teams by using a DevOps approach with an open, unifying platform for z/OS mainframes. Find out how enterprises reduce cost and risk for source code management (SCM) strategy.
Tags : 
ibm, devops, z systems, scm, source code
    
IBM
Published By: IBM     Published Date: Apr 21, 2016
"Reshaping trading partner communities with growth, agility and scalability View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM B2B Cloud Services cite, including: - Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners"
Tags : 
ibm, b2b, cloud, b2b integration
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.
Tags : 
ibm, data, big data, security, data loss, data protection, threat provention
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM Sterling B2B Cloud Services cite, including: -Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners
Tags : 
ibm, commerce, b2b, b2b integration, cloud, advantage cloud
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
If you need to deploy and scale applications faster to increase revenue, Cisco’s integrated infrastructure solutions can help you achieve your goals—and reduce risk. Technology transitions—such as cloud, mobility, big data, and the Internet of Things—bring together people, processes, data, and things to make resources and connections more valuable to your business. They also challenge the role of IT in the enterprise. For your IT department to stay relevant to your lines of business, it must deliver value faster and invest in innovation. Cisco Unified Computing System™ (Cisco UCS®) integrated infrastructure makes it possible to deliver Fast IT—a new IT model that transforms your data center infrastructure into an environment that is fast, agile, smart, and secure. You can break down the IT barriers that are holding your business back and create solutions that capture the value of new connections and information.
Tags : 
    
Cisco
Published By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Secure at the Source: Save money and reduce risks by correcting software vulnerabilities early on in the development lifecycle. Download this free white paper to learn more.
Tags : 
vulnerabilities, secure application, ibm, source code, software development, it security
    
IBM
Published By: SAS     Published Date: Oct 03, 2018
Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to: • Protect from reputational, regulatory and financial risks. • Reduce the cost of fraud and financial crimes prevention. • Gain a holistic view of risk across functions. • Include cyber events in regulatory report filings. In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.
Tags : 
    
SAS
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network
    
Cisco
Published By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t
    
AT&T
Published By: IBM     Published Date: Oct 17, 2013
Have you heard about the DevOps revolution? What’s all the buzz about? Find out more in this report by Kurt Bittner, Analyst, Forrester Research, Inc. Even if full continuous delivery is not your goal, proceeding toward it can help increase reliability, reduce risks, and decrease costs. As Kurt shares, “The revolution is just beginning, but it’s real — and the time to act is now.”
Tags : 
forrester report, ibm, alm, application lifecycle, application lifecycle management, delivery, devops, continuous delivery, ad&d, application development
    
IBM
Published By: IBM     Published Date: Sep 15, 2014
Application release and deployment practices are the backbone of the DevOps movement. Learn how automating application release and deployment can speed time to market, drive down costs and reduce risk. Improve software deployment in your organization through innovative automation methods!
Tags : 
application release, deployment practices, software development, software delivery products
    
IBM
Published By: Maplesoft     Published Date: Dec 27, 2017
Learn how the technique of virtual commissioning promises to reduce the significant delays and costs associated with the difficult task of system integration and commissioning.
Tags : 
maplesoft, virtual commissioning, manufacturing automation, product design, system integration
    
Maplesoft
Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.