Risk ManagingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Managing returned the following results.
RSS What is RSS?
Related Categories

 •   Work Order Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Supply Chain Optimization
 •   Supply Chain Execution
 •   Inventory Management
 •   Supply Chain Management
 •   Business Planning

Related Searches
 •   Create Risk
 •   List Risk Managing
 •   Maintain Risk
 •   Risk Conversion
 •   Risk Managing Idaho
 •   Risk Managing Intrastructures
 •   Risk Managing Organizational
 •   Risk Managing Public
 •   Risk Managing Tool
 •   Risk Speed
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Information Risk: Managing Digital Assets in a new Technology Landscape by Hewlett-Packard Limited

February 25, 2014 - (Free Research)
This in-depth report outlines the current threat landscape, different types of risks, and what you can do to prevent devastating cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Managing Supply Chain Risk by SAP America, Inc.

January 01, 2006 - (Free Research)
Download this white paper and explore new thinking on potential risk to global supply chains and how companies are adopting the statistical methods more commonly associated with finance and insurance. Learn how identifying and profiling risk variables, quantifying risk and using IT solutions can create higher resilience for supply chain management. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring by Sybase, an SAP company

November 02, 2011 - (Free Research)
Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 15, 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

Employee Use of Personal Devices: Managing risk by balancing privacy and security by McAfee, Inc.

August 23, 2011 - (Free Research)
Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk. 
(WHITE PAPER) READ ABSTRACT |

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension

January 27, 2010 - (Free Research)
Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment. 
(WHITE PAPER) READ ABSTRACT |

Dealing with Governance, Risk & Compliance in an Info-Centric World by CommVault Systems, Inc.

October 31, 2013 - (Free Research)
View this comprehensive report from Quocirca Research on how to manage multiple aspects of governance, risk, and compliance (GRC), and learn why a comprehensive GRC platform -- as opposed to a combination of different tools -- can help you effectively manage your organization's information assets. 
(WHITE PAPER) READ ABSTRACT |

Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email by Coviant Software Corporation

December 14, 2010 - (Free Research)
Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers. 
(WHITE PAPER) READ ABSTRACT |

Handle with Care: Calculating and managing risk is tricky business by SearchSecurity.co.UK

March 25, 2011 - (Free Research)
In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape. 
(EZINE)

Manufacturing Company Increases Productivity While Managing Risk by Sunrise Technologies

March 2008 - (Free Research)
Companies rely on its enterprise resource planning (ERP) system to help manage finances, manufacturing, and the supply chain. Learn how one companied increased productivity while managing risk with a reliable, efficient and adaptable solution. 
(CASE STUDY) READ ABSTRACT |

SAP GRC Access Control Solution by HCL Technologies Ltd.

May 2008 - (Free Research)
This white paper discusses how SAP Governance, Risk, and Compliance (GRC) Access Control allow organizations to collaboratively define and oversee SoD enforcement, role management and compliant provisioning. 
(WHITE PAPER) READ ABSTRACT |

Financial Institutions: Managing Operational Risk with RSA® Archer® by RSA, The Security Division of EMC

November 2013 - (Free Research)
Access this white paper to discover a solution that today's financial institutions can use to balance risk quantity with management quality in order to ensure an efficient and effective program. 
(WHITE PAPER) READ ABSTRACT |

How to Get Started with Enterprise Risk Management by RSA, The Security Division of EMC

December 2010 - (Free Research)
Enterprise Risk Management is a practice that has been around for decades, tracing its roots all the way back to the early 1970s. It garnered much attention in the early 2000s when the New York Stock Exchange required all of its listed companies to mandate their Audit Committees to “discuss policies with respect to risk assessment and management.” 
(WHITE PAPER) READ ABSTRACT |

Deloitte Consulting Presents: Risk and TCO in Single and Multivendor Networks by Cisco Systems, Inc.

March 2012 - (Free Research)
Can a multivendor network infrastructure actually reduce your overall costs, as some claim? To answer this question, Deloitte Consulting conducted in-depth research looking at enterprises' total cost of ownership (TCO), including capital outlays, operating expenses, and analyzed risks associated with the network. 
(WHITE PAPER)

IT Reputational Risk Study Overview by IBM

December 2012 - (Free Research)
This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment. 
(VIDEO) READ ABSTRACT |

Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry by Oracle Corporation

February 2011 - (Free Research)
In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.” 
(WEBCAST) READ ABSTRACT |

Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk by Pitney Bowes Group 1 Software

April 2008 - (Free Research)
What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates. 
(WHITE PAPER) READ ABSTRACT |

Demystifying IT Risk to Achieve Greater Security and Compliance by Lumension

January 2010 - (Free Research)
Read this white paper to learn how organizations need an intelligent approach to gaining the upper hand when it comes to assessing IT risk and managing compliance. 
(WHITE PAPER) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

Are businesses taking chances when it comes to managing outsourcing risk? by ComputerWeekly.com

December 2010 - (Free Research)
Nearly 95 percent of organisations buy, provide or both buy and provide outsourced services and functions, in which they face inherent risks created by new and unforeseen challenges. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in Outsourced Manufacturing by E2open

December 2008 - (Free Research)
This white paper looks at some of the management risks and challenges associated with outsourced manufacturing strategies and summarizes the proven ways used by companies that have successfully resolved or mitigated these risks. 
(WHITE PAPER) READ ABSTRACT |

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today by SSH Communications Security Corp.

May 2012 - (Free Research)
While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them. 
(WHITE PAPER) READ ABSTRACT |

Effective Risk Management in a Collaboration Driven Enterprise by AvePoint, Inc.

August 2008 - (Free Research)
How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability. 
(WHITE PAPER) READ ABSTRACT |

REMOTE CONTROL: How to Reduce the Cost, Complexity and Risk of Managing Your Distributed IT Infrastructure by Uplogix

April 2008 - (Free Research)
This white paper outlines the requirements of managing a highly distributed IT environment and examines how new secure remote management solutions can drastically reduce the cost, complexity and risk of managing remote locations. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts