Risk Enterprise BusinessWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Enterprise Business returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Enterprise Resource Planning (ERP)
 •   Data Security
 •   Endpoint Security
 •   Managed Security Services
 •   Wireless Security
 •   Mobile Device Management
 •   Customer Data Integration
 •   Anti-Spyware
 •   Business Intelligence Solutions

Related Searches
 •   Active Risk
 •   Communication Risk Enterprise Business
 •   Evaluation Risk
 •   Impact Risk
 •   Implementation Of Risk Enterprise
 •   Report Risk Enterprise Business
 •   Risk Enterprise Business Delaware
 •   Risk Enterprise Templates
 •   Risk Hardware Provider
 •   Software Risk Enterprise
Advertisement

ALL RESULTS
1 - 25 of 471 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Manufacturing Company Increases Productivity While Managing Risk by Sunrise Technologies

March 2008 - (Free Research)
Companies rely on its enterprise resource planning (ERP) system to help manage finances, manufacturing, and the supply chain. Learn how one companied increased productivity while managing risk with a reliable, efficient and adaptable solution. 
(CASE STUDY) READ ABSTRACT |

McAfee Enterprise Mobility Management: What to Look for in an End-to-End Solution by McAfee, Inc.

August 2011 - (Free Research)
This paper offers an overview of the serious risks associated with the use of mobile devices. View now to explore best practices for mitigating mobile security risks, key requirements for an enterprise mobility management (EMM) solution, how to leverage the benefits of mobile devices while reducing risks and costs with McAfee, and more. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

Delivering Trusted Data across the Enterprise - Business Objects Data Services by Business Objects

June 2008 - (Free Research)
BusinessObjects Data Services XI 3.0 is your solution for delivering trusted data across the enterprise. It allows you to address initiatives such as ERP, BI, data warehousing, data migration, and master data management. Learn more in this whitepaper. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk, and Compliance Management: Realizing the Value Of Cross-Enterprise Solutions by SAP America, Inc.

January 2007 - (Free Research)
This paper explains SAP’s vision for a cross-enterprise GRC solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Protect and Maximize Stakeholder Value by Oracle Corporation UK Ltd

February 2009 - (Free Research)
This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Risk Management: Enabling Risk-Adjusted Management of Strategy and Performance by SAP AG

September 2010 - (Free Research)
Find out how SAP software allows you to identify, mitigate, and manage risk so that you can increase visibility into the impact of risks, reduce cost and risk across strategic initiatives, and increase your strategic effectiveness. 
(VIDEO) READ ABSTRACT |

E-commerce and Consumer Retailing: Risks and Benefits by ISACA

December 2010 - (Free Research)
ISACA recently unveiled the results of its 2010 survey "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety." This white paper discusses many of the risks associated with such actions and provides recommendations for enterprises dealing with such challenges. 
(WHITE PAPER) READ ABSTRACT |

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives by ISACA

December 2009 - (Free Research)
This paper clarifies what cloud computing is, identifies the services offered in the cloud, and also examines potential business benefits, risks, and assurance considerations. Read on to learn more about cloud computing from security, governance, and assuarance perspectives. 
(WHITE PAPER) READ ABSTRACT |

Webcast - Closing the Four Security Risk Gaps of Mainframe Console Access by I/O Concepts Inc.

December 2008 - (Free Research)
The information presented in this webcast can help you be sure your company's commitment to security includes all levels of mainframe access. 
(WEBCAST) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

E-Guide-- Risk-Based Audit Methodology: How to Achieve Enterprise Security by IBM

October 2010 - (Free Research)
Read this e-guide to learn about a simple risk-based audit methodology for organizations to develop an internal IT audit program, or those looking for new ways to assess security risks. 
(EGUIDE) READ ABSTRACT |

Risk Management: Protect and Maximize Stakeholder Value by Oracle Corporation

February 2009 - (Free Research)
This white paper explains how a risk management program can help identify opportunities for value creation while also protecting against potential threats. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Value with Oracle Governance, Risk & Compliance by Oracle Corporation

October 2010 - (Free Research)
In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients. 
(WHITE PAPER) READ ABSTRACT |

COBIT5 For Risk by ComputerWeekly.com

November 2013 - (Free Research)
This is a preview of a  report from ISACA offering guidance on how to use the COBIT 5 framework to establish the risk governance and management functions for the enterprise. 
(ESSENTIAL GUIDE) READ ABSTRACT |

SearchCompliance.com E-Guide: The Guide to GRC Frameworks and Implementation by BWise

October 2010 - (Free Research)
This E-Guide breaks down the GRC layers and the hierarchical relationship, with vital solutions to minimizing enterprise risk and maintaining compliance regulations. Learn how loopholes in an organization’s GRC systems can lead to risk and prevent the creation of an efficient system for the organization. 
(EGUIDE) READ ABSTRACT |

The Application Usage and Risk Report by Palo Alto Networks

June 2010 - (Free Research)
The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period. 
(WHITE PAPER) READ ABSTRACT |

Effective Risk Management in a Collaboration Driven Enterprise by AvePoint, Inc.

August 2008 - (Free Research)
How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Risk Management in the Financial Services Industry: International Benchmark Survey May 2007 by SAS

September 2008 - (Free Research)
This report presents the 2007 results of SAS' annual international benchmark survey on enterprise risk management (ERM) in the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

UMB FINANCIAL CORPORATION: Regional bank gains an aggregate view of enterprise risk by RSA, The Security Division of EMC

March 2012 - (Free Research)
Learn how one of the largest independent banks in America was able to enhance their risk and compliance posture by switching their existing disjointed and inefficient enterprise risk management system (ERM) to a single platform that enabled better information transparency, centralized risk control and more. 
(CASE STUDY) READ ABSTRACT |

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology by RSA, The Security Division of EMC

December 2010 - (Free Research)
As a result of the financial crisis beginning in 2008, companies are faced with an ongoing dilemma: reduce costs now while maintaining an appropriate risk management structure and preparing for the impending increase in regulatory demands. 
(WHITE PAPER) READ ABSTRACT |

Critical Technologies for Compliance & Risk Management for Medical Device Companies by Siperian, Inc.

February 2009 - (Free Research)
Building the foundation for a sound master data management program is critical to the success of any compliance effort. The ten requirements in this paper will enable you to identify a suitable technology platform - a prerequisite when managing your organization's master data assets & critical to establishing a consistent master data foundation. 
(WHITE PAPER) READ ABSTRACT |

Supporting information technology risk management by IBM

October 2011 - (Free Research)
Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Understanding Risk: An Opportunity for IT Managers by IBM

December 2010 - (Free Research)
This presentation transcript of the webcast “Understanding Risk: An Opportunity for IT Managers” outlines the results of an IBM Global Risk Study that was commissioned to understand how IT managers are working to understand and mitigate risk. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Considerations for Integrating Intelligence into Security Operations by VeriSign EMEA

December 2009 - (Free Research)
This whitepaper outlines four critical elements of cyber security intelligence that organizations must meet to ensure that the integration of the intelligence will help improve the safety and profitability of enterprises. This paper also presents specific questions to ask when determining the best approach for an overall risk-mitigation strategy. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 471 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts