reduce risk

Results 126 - 150 of 327Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: May 18, 2012
Data center consolidation and migration projects are fraught with risk. By using Network Behavior Analysis (NBA) systems to get a handle on dependency information, usage information, change impact information, and post-change problem identification, IT organizations can significantly reduce risk by automating and improving the planning process and minimizing disruption during implementation. Download this informative Riverbed white paper to learn more.
Tags : 
data center consolidation, migration, it infrastructure, network behavior analysis, nba analysis
    
Riverbed
Published By: Lumension     Published Date: Nov 19, 2010
Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Here are four steps to cure your patch management headache.
Tags : 
lumension security, patch management, vulnerability management, risk mitigation, best practices, operating system, patch deployment
    
Lumension
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi
    
IBM
Published By: JobPad inc     Published Date: Mar 29, 2012
Try JobPad's patent pending outplacement service and reduce your outplacement costs by 90%. JobPad is a new trend in cost effective outplacement. By offering JobPad, you will be seen as a responsible Company and reduce legal risks. It costs less than 10% compared to traditional outplacement service.
Tags : 
outplacement, career transition, downsizing, layoffs, restructuring, human resources
    
JobPad inc
Published By: Allscripts     Published Date: Feb 18, 2015
Value-based care has arrived. Does your practice have a strategy ready? Download this step-by-step guide to planning and executing a value-based care strategy that's right for your individual practice needs.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: IBM     Published Date: Sep 15, 2014
Application release and deployment practices are the backbone of the DevOps movement. Learn how automating application release and deployment can speed time to market, drive down costs and reduce risk. Improve software deployment in your organization through innovative automation methods!
Tags : 
application release, deployment practices, software development, software delivery products
    
IBM
Published By: IBM     Published Date: Jul 09, 2015
Learn how automating application release and deployment can speed time to market, drive down costs and reduce risk.
Tags : 
application release, application deployment, devops, software delivery, automating applications, best practices, reliable deployment process, innovative automation methods
    
IBM
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing
    
Shavlik Technologies
Published By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
    
Mimecast
Published By: Intel Security     Published Date: Oct 21, 2015
Get free access ($195 value) to this Gartner research that identifies 12 commonly observed network security practices that reduce network availability, increase expenditure or risks, and alienate end users. CISOs should avoid these practices, and they can do so without sacrificing security posture or breaking the bank.
Tags : 
mcafee, intel, security, gartner, report, network
    
Intel Security
Published By: NetApp     Published Date: Jun 27, 2016
Flash success demands that critical questions be asked when choosing the right solution. Simplify your purchase cycle, lower costs and reduce the risk of technology acquisition. Download the Gartner report today.
Tags : 
    
NetApp
Published By: Schneider Electric     Published Date: Apr 16, 2018
Power system operators have lots of questions about the aging switchgear they maintain: • How can we reduce risk for an outage or arc flash event? • What kind of project is required to fix my problems? • Is total replacement my best option? Find answers in "Answer Guide: Make Aging Switchgear Last Longer and Perform Better." Learn the benefits and how-tos of switchgear modernization and see easy-to-install solutions for any OEM's equipment.
Tags : 
switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric, circuit breaker upgrade, obsolete switchgear
    
Schneider Electric
Published By: IBM     Published Date: Jul 14, 2014
This paper discusses the importance of workloads when planning for your migration to the cloud. It also describes how a structured approach to cloud workload analysis can help you identify cloud initiatives that offer faster time to value, reduced migration risk and higher potential return.
Tags : 
ibm, cloud, cloud services, cloud portfolio, workloads, cloud workload, migration, roi
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.
Tags : 
ibm, data, big data, security, data loss, data protection, threat provention
    
IBM
Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel
Published By: HPE Intel     Published Date: Mar 15, 2016
Enterprise Storage and Backup Transformation Workshop helps you to: • Bring key stakeholders together in a focused workshop • Create an agreed-upon list of next initiatives • Reduce the risk of new projects • Improve solution total cost of ownership • Quickly recognize tangible returns Download "Guide your data transformation: HPE Storage and Backup Transformation Workshop" to learn more.
Tags : 
    
HPE Intel
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to identify, understand, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to identify, understand, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
new product, crowd cast, business intelligence, silo, npi, npd, new product development
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, strategic planning, sap, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Crowdcast     Published Date: Mar 09, 2010
Leverage the tacit knowledge in your organization to improve decision making, increase control, and proactively reduce risk.
Tags : 
crowdcast, collective intelligence, strategic planning, sap, it project management, project management, project, business intelligence
    
Crowdcast
Published By: Oracle     Published Date: Feb 21, 2018
With aging populations, new reimbursement models, and increasing competition, we are rapidly approaching a future where high-cost providers will not survive. Oracle’s Cost-Effective Healthcare solution is a modern, secure, SaaS, PaaS, and IaaS solution. Reduce cost Mitigate risk Single source of truth Secure, modern, secure cloud Oracle’s Cost Effective Healthcare solution leverages Oracle’s modern cloud and provides a single source of truth to address risk and cost of care, while securing clinical data.
Tags : 
    
Oracle
Published By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : 
dyn, dns, downtime risk, end-user experience
    
Dyn
Published By: Dell EMC     Published Date: Nov 04, 2016
Whether you’re dead set on winning the America’s Cup for Britain the first time like Olympian Sir Ben Ainslie or simply determined to keep your business competitive, success demands an infrastructure that can deliver quickly. Download the case study to learn how Ainslie’s British sailing team Land Rover Bar used innovative IT to deliver agility, reliability and speed in its bid to win, and how using hyper-converged infrastructure created a competitive advantage through improved performance and collaboration, reduced risk to critical applications, and provided the ability to spin up VMs in less than 15 minutes.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange
    
Dell EMC
Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform
    
Venafi
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.