reduce risk

Results 301 - 325 of 350Sort Results By: Published Date | Title | Company Name
Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail
    
Aventail
Published By: Datalink     Published Date: Aug 21, 2009
Read this white paper to learn how email storage management and email archiving technologies can help optimize resources and reduce risk and cost for your company.
Tags : 
email archiving, content management, cms, content management system, email archive, email storage, email inbox, datalink
    
Datalink
Published By: IBM     Published Date: Dec 12, 2006
This white paper will examine the potential of a technological breakthrough to reduce trust-based risks and change the way organizations reach a harmonious balance between consumer privacy and information sharing.
Tags : 
identity management, compliance, knowledge management, contact management, information management, privacy, customer privacy, privacy policy, privacy policies, ibm
    
IBM
Published By: IBM     Published Date: May 30, 2008
This white paper, authored by industry analyst IDC, explores the problems confronting IT organizations today as they seek to bring data together from disparate sources in order to achieve better information coherence, operational efficiency, and more effective overall governance. Specifically, the paper considers the problems posed by the complexity of "data integration" technology in terms of its configuration and maintenance. It looks at the utility of a grid computing approach in providing scalability and manageability for "data integration" and considers how an appliance approach can further reduce cost and risk for customers.
Tags : 
information management, data integration, blade server, ibm, leveraging information, ibm li, li campaign
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Financial services companies face an array of demanding and ongoing challenges—global competition, mergers, acquisitions, converging service offerings, and an imperative to build and maintain customer loyalty. This white paper explores the landscape of operational risk in the financial services industry, and suggests ways an IBM Maximo IT asset management solution can reduce IT and operation risk while adding strategic benefits.
Tags : 
asset management, service management, maximo, financial services, ibm, ibm mi, ibm grm, it management
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
As your data volume and value increases, reduce your risk with the IBM System Storage DS3400 Express. This direct-attach storage (DAS) or SAN solution is scalable and expandable to consolidate your data. It’s also flexible and affordable for small and midsize businesses. Get all the details at a glance in this data sheet.
Tags : 
ibm, express seller, system storage, ds3400, san solution, ds3400 express
    
IBM
Published By: Quocirca     Published Date: Mar 13, 2008
The Average Inc. could do quite a lot to improve the ways it uses technology in order to reduce risk, ensuring business continuity, and to cut unnecessary cost. If Average Inc. needs to improve its use and management of its ICT infrastructure, then that means most real companies do as well.
Tags : 
ict, quocirca, communications, infrastructure, business continuity
    
Quocirca
Published By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : 
quocirca, outsourcing, security
    
Quocirca
Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management
    
Quocirca
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Companies that purchase fuels, chemicals, solvents and other products often have to make a choice: either reduce costs by keeping inventory levels low, risking run-outs and lost sales, or keep enough surplus inventories on hand to be prepared for unforeseen spikes in product demand, which tends to drive up inventory costs and market price risks.
Tags : 
inventory, fuels, chemicals, world telemetry, worldtelemetry, vmi, vendor-managed inventory, business intelligence, business metrics, analytical applications, business analytics
    
WorldTelemetry, Inc.
Published By: Thinksoft     Published Date: Dec 03, 2007
This white paper acts as a tool, for CEO's and Business and IT heads, helps reduce application deployment risks and costs. This paper attempts to establish how outsourcing test services to an independent domain-focused specialist company can substantially mitigate deployment risks. Business users are assured of receiving reliably better quality application well within cost and time budgets.
Tags : 
outsourcing, outsourced software testing, software testing, testing vendor, stages in outsourced software testing, independent software testing, thinksoft
    
Thinksoft
Published By: Tideway Systems     Published Date: Dec 11, 2007
Many firms are embarking on ambitious data center optimization projects to significantly reduce cost in hardware, maintenance, licensing, rack space, cooling and power – only to realize they are lacking fundamental data about their environment. Learn how you can accelerate and de-risk your data center optimization initiatives.
Tags : 
infrastructure, network management, configuration management, cms, cmml, cmdb, datacenter, data center, datacenters, tideway, tideway systems
    
Tideway Systems
Published By: Intellitactics     Published Date: Feb 28, 2008
Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.
Tags : 
siem, intellitactics
    
Intellitactics
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm
Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : 
application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load, service monitoring, port check (standard and custom ports), number of processes running, specific process monitoring, database monitoring, mysql replication monitoring, oracle rman backup monitoring, vpn monitoring: farend ping test, load-balanced ip monitoring, external url monitoring, centralized ids, logging monitoring
    
NeoSpire Managed Hosting
Published By: SAS     Published Date: Mar 06, 2018
Location data is found everywhere – with an item or a device, in a conversation or behavior, in machines or sensors, tied to a customer or competitor, attached to a database record or recorded from vehicles or other moving objects. Organizations want to take advantage of location data to improve decisions, create better customer engagement and experiences, reduce risks and automate business processes.
Tags : 
    
SAS
Published By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : 
lumension security, patch management, vulnerability management, risk mitigation, best practices, operating system, patch deployment
    
Lumension
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
In today’s global economy, companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to backup processes. A new architectural approach allows IT to project virtual servers and data to the edge, providing for local access and performance. Learn to take advantage of this new approach to recover faster, reduce risk, and save money.
Tags : 
it services, virtual servers, recovery, reduce risk, storage, performace
    
Riverbed Technology, Inc.
Published By: Delphix     Published Date: Apr 14, 2011
Delphix, announced that Oracle E-Business Suite customers can reduce risk and time, and cut additional storage requirements by using Delphix Server.
Tags : 
delphix, oracle, e-business suite upgrades, storage requirement, database virtualization, infrastructure
    
Delphix
Published By: CA Technologies     Published Date: Jul 06, 2011
Written by Malcolm Fry, this whitepaper is based on the service life cycle approach to service management and it provides a great foundation to organisations who want to reduce risk and gain maximum benefit from cloud computing.
Tags : 
ca. service management, it service management, cloud-computing, cloud, servicedesk, itsm, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers, public cloud, technology white paper, analyst report.
    
CA Technologies
Published By: Allscripts     Published Date: Feb 18, 2015
Value-based care has arrived. Does your practice have a strategy ready? Download this step-by-step guide to planning and executing a value-based care strategy that's right for your individual practice needs.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: Allscripts     Published Date: Feb 18, 2015
Download this case study to learn how Allscripts Professional solutions have helped Cornerstone Medical Care in Brandon, Florida negotiate value-based contracts, accounting for a seven-figure increase in revenue.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.