it risks

Results 226 - 250 of 755Sort Results By: Published Date | Title | Company Name
Published By: TriNet     Published Date: Nov 08, 2017
Human resource outsourcing is a complex industry with a broad spectrum of products and services that can be bundled or delivered a la carte. This paper identifies the complexities and potential risks for small businesses considering outsourcing HR.
Tags : 
    
TriNet
Published By: IBM     Published Date: Oct 09, 2012
Insights from the 2012 Global Reputational Risk and IT Study: How security, business continuity and technical support can shape the reputation and value of your company.
Tags : 
security risks, it security, reputational risk, business continuity, infographic, ibm, business technology
    
IBM
Published By: Delphix     Published Date: Jun 27, 2014
IT has to do it all: react quickly to market needs, introduce new services, capitalize on mobile, and comply with regulatory requirements, all without raising costs and complexity. Delphix has the platform to enable IT teams to navigate their business past the risks, saving money and time.
Tags : 
rationalization, modernization, capitalize on mobile, networking, it management, data management
    
Delphix
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Salesforce.com     Published Date: Jul 02, 2014
The most successful community banks are using advanced customer relations management (CRM) and collaboration technology to mitigate risks and maximize opportunities. Are you ready to take the first step towards a more profitable future? Download this white paper to learn how.
Tags : 
salesforce.com, community banks, customer relations management, crm, collaboration technology, mitigate risks, maximize opportunities, knowledge management
    
Salesforce.com
Published By: Salesforce.com     Published Date: Jul 02, 2014
Providing a consistent picture of the customer household to every line of business results in more lead conversion, cross-selling opportunities and an outstanding customer experience. In this webinar, Kennebunk Savings Bank shares how it transformed its business by breaking down silos, increasing sales effectiveness and orienting all lines of business around the customer.
Tags : 
salesforce.com, community banks, customer relations management, crm, collaboration technology, mitigate risks, maximize opportunities, knowledge management
    
Salesforce.com
Published By: Salesforce.com     Published Date: Jul 02, 2014
Hear directly from First Midwest Bank about their proven success strategies leveraging ExactTarget to better market their bank.
Tags : 
salesforce.com, community banks, customer relations management, crm, collaboration technology, mitigate risks, maximize opportunities, knowledge management
    
Salesforce.com
Published By: Salesforce.com     Published Date: Jul 02, 2014
Hear directly from New Hampshire Bank on how it trained 300 users on salesforce.com and watch a live demonstration.
Tags : 
salesforce.com, community banks, customer relations management, crm, collaboration technology, mitigate risks, maximize opportunities, knowledge management
    
Salesforce.com
Published By: MarkLogic     Published Date: Jun 19, 2017
Integrate your data silos to finally navigate the data maze. This comprehensive white paper addresses a key element in any GRC program: regulatory compliance. Download this paper to learn about the costs, current practices, and associated risks. We’ll also recommend a technologically-enabled approach and highlight its main business benefits for financial services, insurance, and energy companies. Overview Executive Summary Compliance Requirements A Recommended Approach Business Benefits Regulatory Compliance Solution Architecture Related Materials
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting, energy, insurance
    
MarkLogic
Published By: Harvard Business School     Published Date: Feb 04, 2015
It’s easy to generate a burst of revenue. But will your strategies deliver consistently high profits over the long term? Discover the risks of strategic inertia and learn how to develop strategies that keep your firm on top—today and tomorrow.
Tags : 
strategy, competitive advantage, sustainable competitive advantage, global competition, technological innovation, formulate action plans, harvard business school, executive education
    
Harvard Business School
Published By: Intel Security     Published Date: Oct 21, 2015
Get free access ($195 value) to this Gartner research that identifies 12 commonly observed network security practices that reduce network availability, increase expenditure or risks, and alienate end users. CISOs should avoid these practices, and they can do so without sacrificing security posture or breaking the bank.
Tags : 
mcafee, intel, security, gartner, report, network, networking, business technology
    
Intel Security
Published By: BitSight Technologies     Published Date: Feb 20, 2015
Learn how to drastically improve your third-party security compliance and see how your organization should make adjustments to ensure you’re protected from unmitigated risks.
Tags : 
bitsight technologies, security, cyber attacks, monitoring, third party security monitoring, third party risk, risk management, it management
    
BitSight Technologies
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: Compliance Associates     Published Date: Jun 29, 2015
Are you feeling the pressure to meet FDA guidelines on Quality by Design (QbD) principals for Process Validation? Existing manufacturing, LIMS, ERP and document management tools are lacking integration and on demand view of your processes. They have hidden costs, risks and create delays to scalable product manufacturing and revenue. Since the FDA is demanding scientific arguments to support process and product development activies and a lifecyle approach, consider the value of a purpose built app for Process Validation. This new class of APP will bring your products to market faster and lower the risk of costly delays. Download the Primer to learn more.
Tags : 
regulatory compliance services, validation services, regulatory compliance, fda rulings, validator, validation, validation consultants
    
Compliance Associates
Published By: VMware AirWatch     Published Date: Feb 27, 2018
TAKE YOUR MOBILITY STRATEGY TO THE NEXT LEVEL WITH UEM MDM and EMM were only the beginning of the modern workspace evolution. Now, more people than ever before are working remotely—introducing a proliferation of assorted devices and platforms that need to be managed and secured in the enterprise, and consequently creating unprecedented challenges for IT and business leaders. The solution? Unified endpoint management (UEM). In this eBook, you'll learn the key business risks you could face without a comprehensive UEM solution: • Traditional management tools unable to support remote workforces • Siloed management tools leading to higher IT costs • Lack of visibility across endpoints increasing security risks • Disengaged employees driven by a poor user experience
Tags : 
endpoint, management, enterprise, mobility, business
    
VMware AirWatch
Published By: ServiceNow     Published Date: Jan 03, 2017
The scope and value that modern IT service delivery provides a business is increasing dramatically, according to a new research reportfrom Enterprise Management Associates (EMA). And yet in some organizations legacy ITSM systems contribute significantly to reduced credibility for IT departments who fail to integrate with and support important business concerns. This lack of modern IT service delivery creates multiple issues for the enterprise, including: Increasing divergence of IT and business performance Rising costs due to service delivery complexity Inability to measure and protect a business from potential risks Informed by extensive research and two compelling deployment narratives, this report examines what EMA calls “next-generation ITSM” and its contributions toward optimizing changing IT and business requirements. EMA contrasts these advances with the risks of staying with legacy ITSM models and then evaluates and itemizes the risks of “doing nothing” by allowing legacy ITS
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management
    
ServiceNow
Published By: ServiceNow     Published Date: Jan 03, 2017
Replacing your legacy ITSM suite doesn’t have to be scary. So why hasn’t every company migrated to a modern ITSM platform? This eBook explores the best practices for a simpler migration to overcome the fear of legacy suite change, including: How choosing the right partner can smooth the transition Best practices for a phased approach to legacy migration A first-hand look at how one company migrated successfully Read the eBook for more on the risks of inaction and rewards of ITSM modernization.
Tags : 
it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management, service, automation, productivity
    
ServiceNow
Published By: ServiceNow     Published Date: Apr 12, 2017
Read The Total Economic Impact™ of ServiceNow, an April 2017 commissioned study conducted by Forrester Consulting on behalf of ServiceNow, to understand the benefits, costs, and risks associated with the following ServiceNow solutions: IT Service Management, IT Operations Management, and Performance Analytics. The study, commissioned by ServiceNow, covers key findings in these three categories: Modernizing IT Service Management Eliminating Service Outages Optimizing Performance with Real?time Analytics Forrester interviewed seven current ServiceNow customers with years of experience using the solutions identified above. The purpose of the study is to provide potential customers with a framework to evaluate the real world customer experience and economic impact of the Now platform on their organizations.
Tags : 
operations management, performance analytics, it management, it automation, it ticketing, help desk, service desk, itsm, it service management, management, service, automation, productivity, infrastructure
    
ServiceNow
Published By: Determine (Selectica)     Published Date: Jun 29, 2017
As our unpredictable world becomes more complex, interdependent and dangerous, it’s becoming harder to manage third-party risk. Traditional financial and operational risks seem like the good old days. Now procurement has to manage, mitigate and avoid risks as disparate as conflict minerals, cybercrime, natural disasters, resource depletion and many others.
Tags : 
    
Determine (Selectica)
Published By: Determine (Selectica)     Published Date: Oct 24, 2017
Organizations today and for the foreseeable future must have visibility into supplier and third-party operations in order to mitigate risks and achieve compliance.
Tags : 
    
Determine (Selectica)
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : 
palo alto, firewall, applications, ssl, ssh
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge.
Tags : 
palo alto, pwc, advanced enpoint protection, strategy works, company protection, security
    
Palo Alto Networks
Published By: Sprinklr     Published Date: Feb 28, 2018
"It’s more important than ever for brands to have comprehensive social media technology at their disposal. Simply buying a new solution, however, is just the beginning. Today’s brands must deploy social media software so that it allows the highest possible return on investment, empowers them to capture new opportunities, and manage the risks inherent in social media."
Tags : 
social media management software, social media management, social media technology, social tools, social media software, social media, social deployment, digital transformation, guide, sprinklr
    
Sprinklr
Published By: New Voice Media     Published Date: Apr 03, 2017
Are you thinking about moving your contact center to the cloud but have concerns about performance, availability and security? Download our whitepaper to learn how to get the reliability you need from your cloud contact center software. In this whitepaper you will learn: The key benefits of cloud contact centres Three key perceived risks Which tests should be performed to ensure availability How to select a cloud vendor that you can depend on
Tags : 
    
New Voice Media
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.