Risk IndiaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk India returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Technology Outsourcing
 •   Business Intelligence Solutions
 •   Data Center Management
 •   Application Servers
 •   Application Security
 •   Testing and Analysis
 •   Customer Relationship Management (CRM)
 •   Wireless Technologies and Mobile Computing
 •   Data Security

Related Searches
 •   Accessing Risk India
 •   Code Risk India
 •   Proposals Risk India
 •   Retail Risk India
 •   Risk Consultants
 •   Risk India California
 •   Risk India Export
 •   Risk India File
 •   Risk India Imports
 •   Risk India Screen
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 10, 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Location, Location, Location! Best Practices for Selecting Onshore, Nearshore or Offshore Technology Services by Fairway Technologies, Inc.

November 02, 2010 - (Free Research)
This white paper provides an overview of ITO, presents benefit and risk assessments of onshore, nearshore and offshore ITO, and offers best practices to assist in selecting an ITO provider. This paper is based on research compiled from published literature as well as interviews and surveys of technology professionals possessing ITO experience. 
(WHITE PAPER) READ ABSTRACT |

CW Special report on Wipro by ComputerWeekly.com

November 23, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Technical Guide on Mobile Security by SearchSecurity.com

November 01, 2011 - (Free Research)
Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue. 
(EGUIDE) READ ABSTRACT |

CW Special Report on TCS by ComputerWeekly.com

November 23, 2012 - (Free Research)
This 5 page special report from Computer Weekly gives you the facts on TCS, its strategy, products and services and financial performance. 
(ESSENTIAL GUIDE) READ ABSTRACT |

The Total Economic Impact™ Of Dell’s Server Consolidation And Virtualization Solutions by Dell India

August 11, 2007 - (Free Research)
The purpose of this Forrester study is to provide readers with a framework to evaluate the potential financial impact of the Dell Solution. Read this study to better understand and evaluate Dell's server consolidation and virtualization solutions. 
(ANALYST REPORT) READ ABSTRACT |

Computer Weekly - 15 May 2012: Overhauling banking IT by ComputerWeekly.com

May 15, 2012 - (Free Research)
This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital? 
(EZINE) READ ABSTRACT |

Technical Guide on Application Security by SearchSecurity.com

December 31, 2012 - (Free Research)
This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools. 
(EZINE) READ ABSTRACT |

IAM Evaluation And Deployment Guidelines by OpenIAM

January 10, 2014 - (Free Research)
Read this expert e-guide by SearchSecurity.com to get a tutorial on identity and access management (IAM) services and the benefits they offer outside of compliance mandates. Click now for steps to achieving security and business success. 
(EGUIDE) READ ABSTRACT |

CW+: Executive breifing - The Indian Sub-Continent Mobile Market by ComputerWeekly.com

January 07, 2011 - (Free Research)
Juniper  Research defines the Indian Sub  Continent as encompassing the following five countries: Bangladesh; India; Nepal; Pakistan; and Sri Lanka.Despite comprising just five countries, the region  – with more than 1.6 billion inhabitants  – includes nearly a quarter of the global population. 
(WHITE PAPER) READ ABSTRACT |

The Information Agenda: Rapidly Leveraging Information as a Trusted Strategic Asset for Competitive Advantage by IBM India Pvt. Ltd

December 13, 2010 - (Free Research)
This paper will discuss how organizations using an Information Agenda can greatly improve their organizations' ability to identify and manage risk, meet regulatory requirements, speed new products and services to market and enhance customer service. 
(WHITE PAPER) READ ABSTRACT |

SAP GRC Access Control Solution by HCL Technologies Ltd.

May 2008 - (Free Research)
This white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning. 
(WHITE PAPER) READ ABSTRACT |

Airport Insecurity: The Case of Lost Laptops by Dell India

June 2008 - (Free Research)
This paper contains the findings of a study to understand the current risks posed to sensitive and confidential data contained in the laptops of business travelers. 
(WHITE PAPER) READ ABSTRACT |

Inside India: Indians View Their Automotive Future by IBM Line of Business

June 2008 - (Free Research)
A study of the Indian auto industry from University of Michigan Transportation Research Institute's Automotive Analysis Division and the IBM Institute for Business Value. 
(WHITE PAPER)

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects by HCL Technologies Ltd.

June 2008 - (Free Research)
This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool. 
(WHITE PAPER) READ ABSTRACT |

Protecting Sensitive Data and Resources Throughout the Organization by CA (India) Technologies Pvt. Ltd

March 2009 - (Free Research)
CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more! 
(WHITE PAPER) READ ABSTRACT |

Increasing Competitiveness and Reducing Costs in Today's Economy by Microsoft Corporation India Pvt Ltd

November 2009 - (Free Research)
This paper outlines the Microsoft Business Productivity Online Suite, illustrates its relevance to small and midsized business customers, and provides the resources to help you evaluate how your business might benefit from the service. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on PCI by SearchSecurity.com

October 2011 - (Free Research)
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance. 
(EBOOK) READ ABSTRACT |

Meeting the Demands of the Smarter Consumer by IBM

August 2010 - (Free Research)
IBM surveyed more than 30,000 consumers in the United States, Canada, United Kingdom, Brazil, India and China for this report on shopping preferences. Read this report to learn why technology makes consumers smarter, more connected and more certain about what they want. 
(WHITE PAPER) READ ABSTRACT |

CIO Decisions Ezine Vol. 2 by CIO Decisions

September 2008 - (Free Research)
Outsourcing is the quest to offload either commodity or very specialized activities, so that staff can focus on work that truly adds value to the business. 
(EZINE)

Quest Software Finds Increased Security, Disaster Preparedness, and Cost Savings through Virtual Desktop Infrastructure by Dell Software

June 2009 - (Free Research)
After evaluating a number of VDI solutions, Quest was most impressed with vWorkspace, one of its own applications that had been integrated into its product portfolio from its 2007 acquisition of Provision Networks. This case study will show how using VDI resulted in significant time and cost savings for Quest. 
(CASE STUDY) READ ABSTRACT |

OpSource Improves Global Business Management and Streamlines Revenue Recognition with Intacct by Intacct Corporation

March 2010 - (Free Research)
As OpSource grew as a company, they found many inefficiencies and challenges in their financial management system. Read on to learn how OpSource overcame these challenges by switching to Intacct for a new SaaS financial management system. 
(CASE STUDY) READ ABSTRACT |

The Outsourcing Surge by SolovatSoft

August 2008 - (Free Research)
Outsourcing is the quest to offload either commodity or very specialized activities, so that staff can focus on work that truly adds value to the business. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of WANdisco SVN MultiSite by WANdisco (E-mail this company)

July 2013 - (Free Research)
This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts