business risk

Results 176 - 200 of 688Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
CA’s portfolio is designed to drive efficiency from planning through production. A core component of our continuous delivery portfolio is CA Release Automation, a market-leading application release automation solution that delivers full application deployment automation and release coordination across stages, environments and teams. The solution’s analytic capabilities enable DevOps teams to plan, manage, analyze and optimize the continuous delivery pipeline from a single control point. In addition, the portfolio includes CA Agile Central, CA Agile Requirements Designer, CA Service Virtualization and CA Test Data Manager. We continue to invest in and enhance the portfolio, most recently via the acquisition of BlazeMeter, an innovative, SaaS-based performance and load-testing solution.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem, sdlc, mttr
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : 
mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid, tila respa integrated disclosure, lending efficiency, loan automation, lending automation, mortgage automation, ucd, uniform closing dataset
    
Fiserv
Published By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
Don't let the risk or cost of ransomware storm your organization's castle. it will wreak havoc on your valuable data and impact business continuity. Instead, employ a multi-layer security strategy that not only includes anti-malware, firewall, and hard disk and file encryption, but also data loss prevention technology and standards- based data protection. Each are critical to mitigate cyber security risks and protect vital information so you can avoid business disruption without ever paying a king's ransom.
Tags : 
ransomeware, organization, data, business optimization technology, it protection, commvault
    
Commvault ABM Oct
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. The key challenge is how to “go digital” in the right ways. For most companies, it will be an incremental journey. TodaysGeneralCounsel.com suggests that organisations should focus on a broad enterprise-wide information governance strategy developed by IT, legal, records and business stakeholders. Doing so improves governance, risk management and compliance programs. This best practices paper outlines seven important ways that legal teams can make meaningful progress in their digital transformations." .
Tags : 
legal, professionals, digital, practices, docusign, esignature
    
DocuSign UK
Published By: Trimble     Published Date: Jul 24, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: Minimize costly errors before they destroy your profit margin Retain the knowledge of your top estimators, even if they leave Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: Trimble     Published Date: Aug 20, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: • Minimize costly errors before they destroy your profit margin • Retain the knowledge of your top estimators, even if they leave • Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: CheckMarx     Published Date: Nov 02, 2018
As DevOps continues to be widely adopted by fast-moving organizations, software security needs to keep pace to help accelerate software delivery and not slow it down. Is your software security program up to the challenge? By integrating security into the entire software development lifecycle, enterprises can manage their business risk and guarantee secure software delivery at the speed of DevOps. Check out these 10 Essential Best Practices for building and maintaining your modern-day software security program -- from your tools, to your processes, to your people. This eBook will cover the top 10 steps you can take today to help your organization move faster and more securely.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
    
CheckMarx
Published By: NAVEX Global     Published Date: Jul 17, 2017
Screening your third party vendors and business partners for risk can be a challenging process. With so many different factors to consider, where do you even begin? We've developed our Anti-Bribery and Corruption Risk Assessment Checklist so you can streamline your compliance risk assessment processes and ensure each potential risk is addressed. Keep up with changing European laws and regulations with this checklist.
Tags : 
training, communication, culture, controls, oversight, policies, risk assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 17, 2017
Thirty percent of organisations expect to do more work through outside third parties in 2017. However, third parties are responsible for 75 percent of foreign bribery schemes, making these engagements rife with risks that can’t be ignored. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with outside business partners. The Definitive Guide to Third-Party Risk Management gives you insight, advice and examples to help your organisation recognise and address third-party risk.
Tags : 
assessments, workflow, overseer, documentation, organisation, writing, review, feedback, updates, security
    
NAVEX Global
Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Sage People     Published Date: May 14, 2018
Compliance is one of the top challenges facing any payroll and HR department. It’s up to you to ensure that all personnel business practices follow current laws and that you are keeping proper records to document your company’s compliance. While an efficient payroll system can help to enhance employee moral and boost your reputation, mistakes in record-keeping and compliance can result in punitive penalties– even lawsuits. Of course, no business wants to expose itself to such financial and reputational risk. However, keeping up to date with payroll legislation can be a complex task. It’s reported that as many as one in three small businesses are penalised for incorrect payroll. To protect your company from costly fines and even litigation, you need to stay informed about employment laws, reporting rules, and changing workforce compliance issues. In this guide, we look at the challenges and the payroll solutions that will help your payroll department meet its compliance requirements wit
Tags : 
    
Sage People
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Cloud Direct     Published Date: Jan 17, 2018
Clearly, data centre modernisation can achieve a wide variety of business benefits for an equally wide variety of organisations. Data centre modernisation programmes are also far reaching. They reach way beyond the desire to merely reduce costs. They add significant business value, and often become the essential cornerstone of digital transformation. When starting on your own path towards modernisation, it’s vital to recognise that your success depends on making use of advanced public cloud services that sit at the vanguard of enterprise technology’s capabilities. If they don’t, you risk not being able to gain access to a world of new possibilities.
Tags : 
applications, data, run time, middleware, operating system, virtualisation, servers, storage, networking
    
Cloud Direct
Published By: IBM     Published Date: Jun 16, 2015
This brochure talks about the IBM Technical Support Services and it helps: Mitigate business risk with services from a forward-thinking industry innovator, Enhance IT availability with a virtually unmatched global infrastructure, Support your unique needs with extensive, flexible and customizable service options, Facilitate easier access to the support you need, Reduce complexity with a single point of contact for nearly all your IT needs, and Facilitate a positive return on investment and performance results
Tags : 
it technical support, it availability, support services, return on investment, performance results, global infrastructure, infrastructure management
    
IBM
Published By: IBM     Published Date: Apr 11, 2016
This paper explores why your business needs the latest operational decision management (ODM) solutions to help turn data insights into action. Discover how IBM Operational Decision Manager software and the IBM Business Process Manager platform work together to: *Recognize patterns that suggest opportunity or risk *Create and shape business events by automating decisions *Bring more dimension and precision to decision making by applying analytics to big data *Help you implement the right business processes by understanding data in context.
Tags : 
ibm, smarter process, operational decision management, odm, knowledge management, business technology
    
IBM
Published By: IBM     Published Date: Jul 08, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance, knowledge management, data management, data center
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.