business risk

Results 376 - 400 of 698Sort Results By: Published Date | Title | Company Name
Published By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
courion, access risk management, cloud based environment, mobile, data loss prevention, data management, data center
    
Courion
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : 
cyber, security, defenders, business value, infrastructure, data, business, protection
    
McAfee EMEA
Published By: HP     Published Date: Jun 23, 2008
In this video, at a high-tech ballistics center managed by National Technical Systems in Camden, Arkansas, HP simulated a gas leak using real explosives to blow up a data center. Every system failed-over after the explosion in less than two minutes—including data on an HP StorageWorks XP12000 Disk Array which failed over flawlessly to an HP StorageWorks XP24000 Disk Array.
Tags : 
disaster, disaster proof, disaster-proof, hp disaster proof, xp24000, disk array, storage
    
HP
Published By: Accelerance     Published Date: Feb 01, 2008
Companies exploring offshore software development often find an overwhelming array of options. For example, is India the best choice? What about China, Russia or Brazil? Time, distance and language barriers also make it difficult to assess the quality of offshore developers. How can businesses reduce the risks of offshoring?
Tags : 
offshoring, vendor selection, offshore, outsource, outsourcing, india, development, developer, programming, programmer, accelerance, software development
    
Accelerance
Published By: Oce Business Services     Published Date: Mar 24, 2008
IDC has found a direct correlation between effective document management and improved business performance. Yet recent research reveals that half of organizations rate their document process management processes as ineffective. This best-practices paper gives you insight into how you can reduce costs, increase productivity, mitigate risk and enhance business performance through the strategic outsourcing of document lifecycle management.
Tags : 
document management outsourcing, document process management, document lifecycle management, outsourcing document management, document management best practices, document process, document, oce, océ, océ, knowledge management
    
Oce Business Services
Published By: Cisco     Published Date: Dec 15, 2010
Adding automation can provide consistent best practice-based execution of procedures, improve business continuity, increase IT productivity, and reduce the risk of business disruption.
Tags : 
cisco, sap system, automation, system copy and refresh, best practice, business continuity, it productivity, automated administration, document management
    
Cisco
Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy, hot site, low cost, high-availability deployment, electronic vaulting, recovery, backup, data recovery, downtime, business data, smbs, small and midsized businesses, recoverability
    
SafeData, LLC
Published By: Symantec.cloud     Published Date: Aug 10, 2010
With 75% of business intellectual property contained in email, efficiently managing this data can pose a major challenge. Learn how hosted email archiving reduces legal risks while improving employee productivity.
Tags : 
messagelabs, symantec hosted services, email archiving, employee productivity, compliance
    
Symantec.cloud
Published By: RackSpace Hosting     Published Date: Feb 17, 2010
Managed Colocation, is the hosting choice of many businesses because it provides the desired level of control while offloading some of the inconvenience, financial risk and upfront capital.
Tags : 
rackspace managed colocation, platform hosting, traditional colocation, web hosting, networking, cloud computing
    
RackSpace Hosting
Published By: RackSpace Hosting     Published Date: Apr 16, 2010
The business demands a solution which maximizes return while investing enough to mitigate perceived business risks, which requires technologies that align with the business's goals and objectives.
Tags : 
rackspace hosting, e-commerce strategy, risk mitigation
    
RackSpace Hosting
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : 
shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment, configuration, monitoring and measurement
    
Shavlik Technologies
Published By: Success Factors     Published Date: Oct 07, 2014
Few things matter more to business success than human capital. The right mix of people, skills, and culture can create competitive advantage for companies, reshape industries, and drive prosperity across regions. As a new generation joins the labor market and employment options evolve in an increasingly global and knowledge-based economy, effective workforce management is a strategic imperative. Opportunities abound in this new environment, for both employers and employees—but so do risks.
Tags : 
successfactors, talent, human capital, labor market, employment, employees, employers, knowledge based economy, effective workplace management
    
Success Factors
Published By: NETIQ     Published Date: Jun 20, 2014
Contractors entail a unique challenge for businesses and for IT. They’re necessary, but provisioning them correctly and deprovisioning them at the right time is difficult. Read this paper to learn to minimize risk and streamline provisioning for contractors and others.
Tags : 
netiq, it contractors, security, enterprise security, risk issues
    
NETIQ
Published By: Intralinks     Published Date: Oct 03, 2013
For many companies, in particular in industries like pharmaceuticals, software development, or entertainment, their intellectual property is more valuable than any physical asset. And with the increasing need to collaborate with external business partners to accelerate product life cycles and enhance innovation, there is a greater risk for sensitive information to be compromised. In this 6-page white paper, discover the benefits of how the right inter-enterprise collaboration tool can ensure secure document sharing and team collaboration, and what to keep in mind as you look for a provider.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, business technology
    
Intralinks
Published By: RSA     Published Date: Aug 28, 2014
Lines of business are being asked to move faster and get access provisioned more quickly, yet organizations have to be more mindful of the risk around managing access, and still enterprises want a simpler, more lightweight approach to provisioning. Today’s organizations are demanding a business-centric approach to provisioning.
Tags : 
provisioning, risk, managing access, enterprises
    
RSA
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
See how a video system can benefit your business by both preventing security risks and providing evidence if a safety event does occur.
Tags : 
video surveillance, exposure to liability
    
Tyco Integrated Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, mobile, byod
    
ThreatTrack Security
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Nov 19, 2015
Many firms—including those in the wholesale distribution sector—have achieved more efficient and business operations by using cloud-based ERP. Whatever the variations on the theme, wholesale distributors face challenges ranging from tight margins to supply chain and delivery-carrier dependencies. Succeeding in this demanding and fast-paced sector requires that companies operate with high efficiency and low error rates. Wholesale distributors that don’t closely track and optimize their core operations can put critical business relationships at risk, seriously undermining their profitability and growth potential.
Tags : 
cloud-based erp, erp, wholesale distribution, business operations
    
Netsuite DWASF Leads Display Q1 2015
Published By: Lenovo and Intel®     Published Date: Oct 14, 2016
Is Windows 10 right for your business? Get All the Answers in This Comprehensive Guide to Windows 10. Making the decision to upgrade your OS in a multi-platform environment can be scary, and worse, risky! Put your mind at ease with this detailed guide to Windows 10 and Enterprise: Upgrade the Way You Work. You'll get details on: • All the new features • Security upgrades • Migration options Get the whitepaper now.
Tags : 
technology solutions, customer feedback, software, data security, encryption, cyberattacks
    
Lenovo and Intel®
Published By: 8x8 Inc.     Published Date: Jun 22, 2017
Are you still using your legacy PBX? Reduce business risks when you move to the cloud. Read the whitepaper for more information.
Tags : 
pbx, private branch exchange, communications, cloud, telecommunications
    
8x8 Inc.
Published By: IBM     Published Date: Oct 13, 2017
Analytics is game-changing and can produce valuable insights from the ever-growing volume, velocity and variety of data. Business Intelligence (BI) provides the foundation for many types of Analytics. It enables companies to deliver exceptional customer experience, enhance marketing effectiveness, increase operational efficiencies, reduce financial risks, improve product quality and reliability, and so on. But businesses are also challenged to generate timecritical actionable insights and make a compelling financial business case for BI investments.
Tags : 
ibm, cognos analytics, business intelligence, customer experience, marketing
    
IBM
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management, data protection
    
Mimecast
Published By: Trillium Software     Published Date: May 19, 2011
Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.
Tags : 
trillium software, underwriting risk, insurers, location intelligence, geocodes, risk management, granularity, risk models, cat, centroid, collective catastrophe, multilingual data, risk exposure
    
Trillium Software
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This white paper will discuss the steps necessary to building a resilient business.
Tags : 
business continuity, mainline information systems, downtime, data loss, risk assessment, bcd, data protection, backup, platform protection, archiving
    
Mainline Information Systems
Published By: Acquia     Published Date: Sep 13, 2011
Learn how you can improve performance, scalability and availability, while reducing business risk and costs with the Drupal Open Source social publishing platform and Acquia Hosting services.
Tags : 
acquia, technology, scalability, drupal, hosting services, open source social publishing platform
    
Acquia
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.