reduce risk

Results 1 - 25 of 342Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Optymyze     Published Date: Feb 05, 2018
Do you want to increase visibility across your global business, reduce risk, and boost sales performance? Find out how a Sales Operations Center of Excellence can help you achieve all this and more: • Lower costs by standardizing processes. • Gain more control over operational performance. • Create standards for collecting, storing, and managing data. • Identify which factors determine harmonization, and how it can benefit your entity. • Ensure global compliance through enterprise standards. • Provide expertise and support to boost sales performance across all business units. Get your free copy now!
Tags : 
sales operations, sales performance, sales performance management, sales processes
    
Optymyze
Published By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : 
data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
    
McAfee
Published By: NAVEX Global     Published Date: Apr 20, 2018
Discover how organisations similar to your own are developing an effective ethics and compliance programme to improve workplace culture and reduce compliance risk. Our new research will help you identify the most appropriate activities to consider for your own programme, provide the data to help benchmark your results, and the guidance to improve buy-in and programme resources. What you'll learn: How are new regulations changing potential ethics and compliance risks? What challenges do compliance professionals face when trying to improve company culture? How are organisations investing in compliance activities? What results are compliance programmes achieving?
Tags : 
    
NAVEX Global
Published By: Tenable     Published Date: Feb 27, 2019
"With the number of vulnerabilities on the rise, and their severity increasing, how can you identify the biggest cyber threats to your business – and know what to fix first? Download the “3 Things You Need to Know About Prioritizing Vulnerabilities” ebook now to: -Discover the 3 critical steps to building an effective vulnerability remediation plan -Explore the pitfalls of popular prioritization approaches -Learn next steps you can take today to dramatically reduce the list of vulnerabilities you need to remediate If you’re looking for answers to questions like “Where should we prioritize based on risk?” and “Which vulnerabilities are likeliest to be exploited?” this quick read is an excellent way to get started. Download the free ebook now."
Tags : 
    
Tenable
Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management
    
Lumension
Published By: Pure Storage     Published Date: Jul 18, 2017
Application consolidation can be an important cloud initiative. By consolidating applications on an all-flash, cloud-centric platform, IT has the opportunity to reduce costs, lower risk and support a more integrated and interoperable infrastructure. But for any organization thinking about application consolidation, it is important to closely evaluate the features and functions of the underlying all-flash storage platform. You want to make sure that your platform not only delivers the performance you need, but also enables you to reduce costs, eliminate migrations, simplify operations and support cloud-enabled business agility.
Tags : 
it management, administration, flash storage, cloud centric platform
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 26, 2017
Application consolidation can be an important cloud initiative. By consolidating applications on an all-flash, cloud-centric platform, IT has the opportunity to reduce costs, lower risk and support a more integrated and interoperable infrastructure. But for any organization thinking about application consolidation, it is important to closely evaluate the features and functions of the underlying all-flash storage platform. You want to make sure that your platform not only delivers the performance you need, but also enables you to reduce costs, eliminate migrations, simplify operations and support cloud-enabled business agility.
Tags : 
it management, administration, flash storage, cloud centric platform
    
Pure Storage
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
Published By: Intellitactics     Published Date: Feb 28, 2008
Learn how best-in-class organizations are using controls to lower operating costs, support higher scale, reduce security risks, and maintain consistent policies for security and compliance.
Tags : 
siem, intellitactics
    
Intellitactics
Published By: CA Technologies     Published Date: Jul 06, 2011
Written by Malcolm Fry, this whitepaper is based on the service life cycle approach to service management and it provides a great foundation to organisations who want to reduce risk and gain maximum benefit from cloud computing.
Tags : 
ca. service management, it service management, cloud-computing, cloud, servicedesk, itsm, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers, public cloud, technology white paper, analyst report.
    
CA Technologies
Published By: Paycor     Published Date: Jun 05, 2014
Did you know that a study shows that almost 39 percent of franchise businesses fail after four years? Or that defaults on loans in the early 2000s were higher for franchised businesses than for independents? Is your business at risk of becoming such a statistic? Staying on top of changes to tax laws and health care reform can be overwhelming. This whitepaper will empower you to mitigate risk and ensure your franchise’s profitability.
Tags : 
franchise, compliance, labor law, wage and hour, tax law, healthcare reform
    
Paycor
Published By: Paycor     Published Date: Jun 05, 2014
Did you know the Department of Labor assessed $82 million in penalties in 2013? Misclassified employees, lack of documentation, payroll errors and employment discrimination lawsuits add up to costly mistakes for healthcare organizations every day. If you’re using spreadsheets to track employee data and relying on disconnected information systems, your organization is at risk of becoming a statistic. This whitepaper will empower you to mitigate risk and ensure your organization can continue to serve its mission.
Tags : 
healthcare, compliance, labor law, wage and hour, tax law, healthcare reform
    
Paycor
Published By: IBM     Published Date: Jul 29, 2014
This white paper will discuss key tips for improving a release process and strengthening release management. Once the following practices are in order, the process can be enabled to keep up with the pace of Agile, and reduce the risks associated with rapid deployments.
Tags : 
ibm, ibm urbancode, release management, release process, deployments, rapid deployment, agility, application releases, application deployment
    
IBM
Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices from HPE’s IT Advisory Consulting Services for migrating and transforming applications in Hybrid IT by capitalizing on innovative platforms, modern application architectures, agile development tools and proven methodologies. There are a number of challenges our customers face when migrating and transforming applications for a Hybrid IT environment. This guide provide proven strategies and application approaches that can help them understand and reduce risks and complexity
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Oct 01, 2012
his independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
virtualization, it infrastructure, software partitioning, reduce costs, risk management
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Analytics is game-changing and can produce valuable insights from the ever-growing volume, velocity and variety of data. Business Intelligence (BI) provides the foundation for many types of Analytics. It enables companies to deliver exceptional customer experience, enhance marketing effectiveness, increase operational efficiencies, reduce financial risks, improve product quality and reliability, and so on. But businesses are also challenged to generate timecritical actionable insights and make a compelling financial business case for BI investments.
Tags : 
ibm, cognos analytics, business intelligence, customer experience, marketing
    
IBM
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI helped a leading global bank digitize its traditional product ecosystem for AML transaction monitoring. With the creation of a data lake and efficient learning models, the bank successfully reduced false positives and improved customer risk assessment. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Symantec     Published Date: Nov 19, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient
    
Symantec
Published By: Kaspersky     Published Date: Feb 05, 2015
This guide provides information on how to reduce risk in today's IT environment.
Tags : 
reduce risk in it environment, it environment security, data security breach prevention, preventive measures for data security
    
Kaspersky
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.