business risk

Results 201 - 225 of 686Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 11, 2016
This paper explores why your business needs the latest operational decision management (ODM) solutions to help turn data insights into action. Discover how IBM Operational Decision Manager software and the IBM Business Process Manager platform work together to: *Recognize patterns that suggest opportunity or risk *Create and shape business events by automating decisions *Bring more dimension and precision to decision making by applying analytics to big data *Help you implement the right business processes by understanding data in context.
Tags : 
ibm, smarter process, operational decision management, odm, knowledge management, business technology
    
IBM
Published By: IBM     Published Date: Jul 08, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance, knowledge management, data management, data center
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
High-priority big data and analytics projects often target customer-centric outcomes such as improving customer loyalty or improving up-selling. In fact, an IBM Institute for Business Value study found that nearly half of all organizations with active big data pilots or implementations identified customer-c entric outcomes as a top objective (see Figure 1).1 However, big data and analytics can also help companies understand how changes to products or services will impact customers, as well as address aspects of security and intelligence, risk and financial management, and operational optimization.
Tags : 
    
IBM
Published By: Sage People     Published Date: Nov 02, 2017
These are the end times for traditional enterprise resource planning (ERP) solutions. Overstatement? Not really—especially for growing businesses like yours. Old-school ERP systems are simply too slow, complex, and inflexible to keep up with today’s business climate. Think about your existing ERP. Does it support industry-specific best practices, ever-changing regulatory requirements, and emerging technologies such as social media, mobile, cloud, and analytics? If not, you could risk losing ground to your competitors as a result.
Tags : 
workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting, audits, account reconciliation, accounting automation, accounting audits, financial systems, contract lifecycle management, business intelligence, business analytics
    
Sage People
Published By: KPMG     Published Date: Jul 10, 2018
Digital transformation brings risks and opportunities for internal audit and risk functions. Are you ready to help the business stay safe in an increasingly challenging technology environment? Watch this webinar to understand: • the unique risks from artificial intelligence • the relevance of AI technologies for internal audit and risk functions • what an effective risk and control framework looks like for AI risks • key actions internal audit and risk functions should consider now.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
Businesses are deploying innovative technologies at speed to secure competitive advantage. How can you manage risk effectively in the rush to the future? Read this guide to find out: • what internal and external risks emerging technologies present • which technologies present the biggest risks and the biggest opportunities • how to design a framework for emerging tech governance • what actions to take to put a new governance framework in place.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
Leading banks have been talking about integrating risk and finance operations with the aim of securing a single, consistent and multidimensional view of their businesses for years. But with a few exceptions, relatively little progress has been made. Read this insight to find out: • why the time to act on risk and finance integration is now • what value integrated risk and finance operations can deliver • what shape a new integrated capability might take • how to prepare the ground for effective transition • key dangers to address to achieve successful transformation. Download the insight now
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
The business is increasingly side-stepping the IT function to procure new technologies. Do you have the right governance in place to encourage innovation and ensure investment is directed for maximum impact? Read this report to find out: • how to balance the opportunities and risks from emerging technology • how to ensure funding for innovation is available and prioritised • where to direct funds for innovation • why ‘guardrails’ work better than rules in the current environment. Download the report now
Tags : 
    
KPMG
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc
Published By: BMC Control M     Published Date: Jul 16, 2009
A short time ago, Dell, like many other companies, embarked on a broad initiative to integrate and upgrade its IT services to better satisfy business needs. As part of this initiative, Dell addressed a job scheduling solution that had failed to keep pace with ITIL_ integration. In enterprises around the world, stale job scheduling software lingers for fear of the costs and risks of conversion. Learn more today!
Tags : 
bmc, ema, dell, dell smart, automation, integration, services, itil, business, software, itsm, roi, bmc control-m
    
BMC Control M
Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, data center
    
EMC Corporation
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
    
Forrester
Published By: IBM     Published Date: Jul 13, 2012
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. But this has introduced new challenges and opportunities. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives.
Tags : 
ibm, technology, risk management, professionals, business, security management, emerging threats, business technology
    
IBM
Published By: Smarsh     Published Date: Dec 07, 2016
Text messaging is simple, concise and compatible with virtually every mobile device, operating system and wireless carrier, making it very appealing to financial advisors and their customers. However, if used for business communications, texts can create tremendous risk. Less than a third of financial firms have a text supervision solution in place according to the Smarsh 2016 Electronic Communications Compliance Survey, the largest compliance gap facing financial firms today. Text messaging can’t be ignored by firms any longer.
Tags : 
    
Smarsh
Published By: Smarsh     Published Date: Dec 07, 2016
This guide contains practical steps that will help you develop a social media strategy so you gain maximum business value from your social efforts. It also outlines some smart policy suggestions—so you can ensure that your organization is protected from damage to your brand’s reputation and the risk of litigation.
Tags : 
    
Smarsh
Published By: NAVEX Global     Published Date: Jul 02, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions now business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
diligence systems, risk management solutions, integrated due diligence, compliance
    
NAVEX Global
Published By: Red Hat     Published Date: Jul 17, 2014
As a strategic partner in your business, you need to respond to growing business demand. Unfortunately, you face several challenges. Your complex IT environment is costly to manage and has a high downtime risk. Most of your resources and budget likely go to maintaining the stability, security and reliability of your IT system. Your organization might lack the processes needed to confidently manage support issues, IT transitions and new application deployments. In this whitepaper you will read about how to maximize uptime, reduce management costs, and quickly respond to business demands.
Tags : 
business demand, security, it transitions, new applications, it systems, efficiency, maximize uptime, manage costs
    
Red Hat
Published By: Delphix     Published Date: Jun 27, 2014
IT has to do it all: react quickly to market needs, introduce new services, capitalize on mobile, and comply with regulatory requirements, all without raising costs and complexity. Delphix has the platform to enable IT teams to navigate their business past the risks, saving money and time.
Tags : 
rationalization, modernization, capitalize on mobile, networking, it management, data management
    
Delphix
Published By: Delphix     Published Date: Jun 27, 2014
Packaged application development teams frequently operate with limited testing environments due to time and labor constraints. By virtualizing the entire application stack, packaged application development teams can deliver business results faster, at higher quality, and with lower risk.
Tags : 
on-demand, application development, virtualizing, packaged, faster, networking, it management, data management
    
Delphix
Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: MarkLogic     Published Date: Jun 21, 2017
Global financial organizations are facing increasing demands from the business for more granularity, transparency, reporting and security. If you’re on the IT side, you know this adds a different set of ‘mores’ to the equation: More duplication, delays, and people. What’s the net-net? More cost and more risk. You can balance the scales to satisfy those demands. And it starts with thinking differently about data management. Our financial services technology experts will explore the implications of governance, risk and compliance (GRC) imperatives. You’ll learn: • Why data is at the heart of an effective and dynamic GRC strategy • Why technological capabilities used to enable standard GRC programs can reduce transparency and prevent you from gaining a holistic view of your data • A new approach to data can provide the business with complete transparency • Review a sample regulatory reporting architecture Stop burning time on tooling — and start building a dynamic GRC strategy that can
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting
    
MarkLogic
Published By: MobileIron     Published Date: Aug 20, 2018
In the PC era, employees operated from within a well defined enterprise IT perimeter and passwords were sufficient to establish user trust. However, in today’s mobile-cloud environment, the enterprise perimeter has dissolved and business information is available to users on a variety of endpoints, apps, services, networks, locations. In this dynamic access environment, organizations need a different approach to security that is able to: • Establish user trust using multiple factor authentication • Correlate user trust with other factors such as endpoint, app, network, and more • Apply adaptive, risk-based policies that match the user’s environment
Tags : 
security, enterprise, cloud
    
MobileIron
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: MuleSoft     Published Date: May 17, 2016
MuleSoft surveyed 802 IT decision makers (ITDMs) globally to assess how organizations of all sizes are executing on digital transformation initiatives, IT challenges and the role of APIs to meet business goals. The survey results reveal challenges that are hindering IT’s ability to achieve digital transformation fast enough. Just 18% of ITDMs are very confident that they will succeed in meeting this year’s digital transformation goals. IT challenges are not only slowing down their ability to complete digital transformation goals this year, but they are also directly putting business revenue at risk. In fact, 66 percent of ITDMs said that their company’s revenue would be negatively impacted within six months. However, the survey found that IT teams are looking to APIs and reuse of existing applications, data and digital resources to speed up the pace of business.
Tags : 
mulesoft
    
MuleSoft
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.