Risk SolutionsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Solutions returned the following results.
RSS What is RSS?
Related Categories

 •   Security Policies
 •   Business Intelligence Solutions
 •   Security Monitoring
 •   Data Center Management
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Power Distribution
 •   Racks and Enclosures
 •   Requisitioning and Procurement
 •   Application Servers

Related Searches
 •   Do Risk
 •   Example Risk Solutions
 •   Examples Risk Solutions
 •   Market Risk Solutions
 •   Risk Network
 •   Risk Solutions Coding
 •   Risk Solutions Conferencing
 •   Risk Solutions Contact
 •   Risk Solutions Work
 •   Schemas Risk Solutions
Advertisement

ALL RESULTS
1 - 25 of 481 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: The Data Center Energy Challenge by Viridity Software

August 09, 2010 - (Free Research)
Read this presentation transcript with Michael Rowan, CTO & Co-Founder of Viridity Software, and Marty Stephens, Director of Information Technology of LexisNexis Risk Solutions, as they discuss how Viridity EnergyCenter software helped LexisNexis Risk Solutions improve energy efficiency and lowered their power bill. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Supporting information technology risk management by IBM

October 01, 2011 - (Free Research)
Access the resource to discover the 5 stages of an effective IT risk mitigation program, the 5 components of efficiently managing IT risks and 5 questions to ponder when assessing risk solutions. 
(WHITE PAPER) READ ABSTRACT |

The Architecture of Next-Generation Intraday Liquidity Risk Management by IBM

September 30, 2013 - (Free Research)
This paper explores potential risk solutions to this challenge, establishing the historic context of liquidity risk management and the specific business problem of intraday liquidity risk. 
(WHITE PAPER) READ ABSTRACT |

The Strategic Supplier Mandate: Three Principles to Deliver Transparency Across the Supply Base by SAP America, Inc.

March 31, 2012 - (Free Research)
Read this article to discover the three supplier management initiatives that have helped market-leading procurement organizations drive innovation, increase productivity and mitigate risk. 
(WHITE PAPER) READ ABSTRACT |

Scotiabank: Enabling real-time credit analysis by IBM

September 25, 2013 - (Free Research)
View this resource to learn how business analytics solutions enable companies to identify and visualize trends and patterns in areas, such as customer analytics, that can have a profound effect on business performance. 
(WHITE PAPER) READ ABSTRACT |

Secure your data – protect your business by ComputerWeekly.com

November 12, 2012 - (Free Research)
This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Financial Institutions: Managing Operational Risk with RSA® Archer® by RSA, The Security Division of EMC

November 30, 2013 - (Free Research)
Access this white paper to discover a solution that today's financial institutions can use to balance risk quantity with management quality in order to ensure an efficient and effective program. 
(WHITE PAPER) READ ABSTRACT |

Why Java Exploits Remain a Top Security Risk by Websense

December 31, 2013 - (Free Research)
Learn how the huge number of Java versions in active use makes it vulnerable to attack. Illustrated are the risks from the use of Java and alternatives on how to address these risks, using internal process, Websense solutions or a mixture of both. 
(WHITE PAPER) READ ABSTRACT |

Risk and Compliance Outlook by McAfee, Inc.

November 10, 2011 - (Free Research)
Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk. 
(WHITE PAPER) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 11, 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 07, 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

Disclosures 2012 - The Vulnerability of Publicly Traded Companies by Veracode, Inc.

May 23, 2012 - (Free Research)
In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software. 
(WEBCAST) READ ABSTRACT |

The optimization of everything: OTC derivatives, counterparty credit risk and funding by IBM

December 31, 2013 - (Free Research)
In this white paper, learn about risk management practices and analytics that can aid in the optimization of everything – from OTC derivatives to counterparty credit risk to funding. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk Management and Compliance (GRC) by ComputerWeekly.com

February 04, 2014 - (Free Research)
Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

Information governance: Reduce risk and improve compliance by Iron Mountain

August 29, 2012 - (Free Research)
This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs. 
(WHITE PAPER) READ ABSTRACT |

8 Ways to Minimize Risk Exposure and Contain Litigation Costs by Iron Mountain

March 14, 2012 - (Free Research)
An effective response to litigation requests is pivotal in today's corporate world. Many organizations are struggling to balance litigation-related expenses and organizational risk. This white paper can help. Read this now and gain eight best practice tips for containing the cost of litigation preparation and response while reducing your risk. 
(WHITE PAPER) READ ABSTRACT |

Holistic risk management: Perspectives for IT professionals by IBM

October 16, 2012 - (Free Research)
Business continuity planning and IT security management are increasingly becoming a critical part of enterprise-wide risk management and business resilience frameworks. This report explores how the shift towards more holistic risk management is affecting the day-to-day work for business continuity planners, IT risk managers and security executives. 
(WHITE PAPER) READ ABSTRACT |

Risk Management for Cloud Computing by SearchCIO.com

February 21, 2013 - (Free Research)
This expert resource provides in-depth insight and risk management advice for IT leaders looking to benefit from the cloud. Read now for 20 questions that should be asked of every cloud provider, as well as well as advice for creating harmony between compliance and information security functions, and much more. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: Bridging Policies and Procedures - Fundamental Security Concepts by Global Knowledge

October 2008 - (Free Research)
This white paper discusses risk management as a key process in designing security architectures, including a better way for security managers to approach the security ROI issue. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine: March 2009 - Sky-High Risk? by Information Security Magazine

March 2009 - (Free Research)
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more. 
(EZINE)

Mobile device protection: tackling mobile device security risks by Juniper Networks, Inc.

June 2012 - (Free Research)
The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated. 
(EGUIDE) READ ABSTRACT |

Key Challenges in Risk Management: How Immediate Access to Integrated Information Can Mitigate Risk by Sybase, an SAP company

April 2012 - (Free Research)
<p>This white paper reveals the findings of a recent survey of senior risk and IT decision-makers in international financial institutions, exploring their current risk management capabilities and their plans for introducing integrated technologies, and examining the relationship between data management and risk mitigation in depth.</p> 
(WHITE PAPER) READ ABSTRACT |

Counterparty Risk: Are We Leveraging Our Tools? by Sybase, an SAP company

February 2012 - (Free Research)
While current technologies and techniques allow for more sophisticated and effective approaches to counterparty risk management than those that fell short in 2008, there are still barriers to successful adoption that will require organizational changes. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring by Sybase, an SAP company

November 2011 - (Free Research)
Using a Visual Data Analytics Platform to Monitor and Manage Positions/Exposures in Real-Time Firms that engage in financial trading are exposed to counterparty risk (i.e., credit risk), market risk, and operational risk. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Risk Monitoring: Timely Monitoring and Management of Positions/Exposures by Sybase, an SAP company

June 2011 - (Free Research)
Check out this white paper now, compliments of Sybase, and learn how you can get timely monitoring and management of your positions and exposures—with less risk! 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 481 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts