risk

Results 1 - 25 of 2610Sort Results By: Published Date | Title | Company Name
Published By: Adlib Software     Published Date: Feb 09, 2018
In financial services, contracts often exist in highly dispersed formats, with jurisdictional complexities and risk aspects that change over time—resulting in high levels of risk. Learn how to transform contracts into actionable, defensible assets with a robust contract intelligence solution.
Tags : 
    
Adlib Software
Published By: SAP     Published Date: May 19, 2016
SAP® solutions for enterprise information management (EIM) support the critical abilities to architect, integrate, improve, manage, associate, and archive all information. By effectively managing enterprise information, your organization can improve its business outcomes. You can better understand and retain customers, work better with suppliers, achieve compliance while controlling risk, and provide internal transparency to drive operational and strategic decisions.
Tags : 
    
SAP
Published By: Experian     Published Date: Mar 30, 2017
Businesses today recognize the importance of the data they hold, but a general lack of trust in the quality of their data prevents them from achieving strategic business objectives. Nearly half of organizations globally say that a lack of trust in their data contributes to increased risk of non-compliance and regulatory penalties (52%) and a downturn in customer loyalty (51%). To be of value to organizations, data needs to be trustworthy. In this report, you will read about the findings from this unique study, including: · How data powers business opportunities · Why trusted data is essential for performance · Challenges that affect data quality · The current state of data management practices · Upcoming data-related projects in 2017
Tags : 
    
Experian
Published By: Reltio     Published Date: Feb 12, 2016
Reltio delivers reliable data, relevant insights and recommended actions so companies can be right faster. Reltio Cloud combines data-driven applications with modern data management for better planning, customer engagement and risk management. IT streamlines data management for a complete view across all sources and formats at scale, while sales, marketing and compliance teams use data-driven applications to predict, collaborate and respond to opportunities in real-time. Companies of all sizes, including leading Fortune 500 companies in healthcare and life sciences, distribution and retail rely on Reltio.
Tags : 
    
Reltio
Published By: Silwood Technology     Published Date: Mar 02, 2016
Ever since organisations started to implement packaged software solutions to solve business problems and streamline their processes there has been a need to access their data for the purposes of reporting and analytics, integration, governance, master data and more. Information Management projects such as these rely on data professionals being able to understand the underlying data models for these packages in order to be able to answer the critical question “Where’s the data?”. Without this knowledge it is impossible to ensure accuracy of data or timely delivery of projects. In addition the lack of discovery tools designed to meet this challenge has meant that performing this task has commonly been frustrating, time-consuming and fraught with risk. This white paper offers insight into why the traditional methods are not effective and how an innovative software product from Silwood Technology provides a faster and more effective approach to solving the problem.
Tags : 
    
Silwood Technology
Published By: Data Ninja     Published Date: Apr 16, 2017
By adding structure to free text using text analytics and graph databases, text becomes valuable business data. This paper examines a real life use case in risk analysis. Text is a part of all communication channels from social media, documents, logs, and data bases. In order to use the information from text, you need to extract the data in a way that provides useful information on entities, locations, organizations, and their properties. Graph databases are very powerful in showing the text relationships including the nearest neighbors, clusters, and the shortest paths. The combination of text analytics and graph databases can be used to solve business problems.
Tags : 
    
Data Ninja
Published By: Datawatch     Published Date: Apr 06, 2018
Enterprises are focusing on becoming ever more data-driven, meaning that it is simply unacceptable to allow data to go to waste. Yet, as the amount of data businesses collect and control continues to increase exponentially, many organizations are failing to derive enough business value from their data. Companies are feeling the pressure to extract maximum value from all of their data, both defensive and offensive. Defensive analytics are the “plumbing aspects” of data management that must be captured to mitigate risk and establish a basic understanding of business performance. Offensive analytics build on defensive analytics and support overarching business objectives, strategic initiatives and long-term goals using predictive models. In this whitepaper, you will learn how to address many challenges, including streamlining operational reporting, delivering insight and providing a single, unified platform for everyone.
Tags : 
    
Datawatch
Published By: BackOffice     Published Date: Apr 22, 2018
The success of a business is increasingly influenced by how effectively it utilizes data within strategic decision making & operations. But when a business views its critical data simply as a byproduct of business processes, and doesn’t value it as a business asset, it increases the risk of not being able to achieve its desired outcomes.
Tags : 
    
BackOffice
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"In today’s Idea Economy, businesses need to turn ideas into services faster. Every new business and established enterprise is at risk of missing a market opportunity and being disrupted by a new idea or business model. It has never been easier, or more cru cial, to turn ideas into new products, services, or applications —and quickly drive them to market. But IT needs an infrastructure that enables them to partner with the business to speed the delivery of services."
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Businesses continue to evolve as digital technologies reshape industries. The workforce is mobile, and speed and ef ciency are imperative, necessitating dynamic, cloud-based infrastructures and connectivity, as well as unhindered, secure application access — from anywhere, on any device, at any time. Leaders must remove hurdles to progress, but new business initiatives and processes increase the attack surface, potentially putting the company at risk.
Tags : 
digital technology, cloud, security, connectivity, authenticate
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies
Published By: Panaya     Published Date: Aug 09, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: • Strategiaclly align feature releases and backlogs with your overall business strategy • Identify and prioritize dev and test activities with visibility into project waves and portfolios • Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks • Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: CA Technologies EMEA     Published Date: Sep 12, 2018
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing. In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever. Recorded Feb 5 2018 49 mins Presented by Steve Feloney, VP Product Management CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 30, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
There are so many opportunities for businesses to collect data that getting a clear picture of all of it can be an uphill battle—and leveraging it for insight can be nearly impossible. But whether you are a start-up or a multinational conglomerate, not taking advantage of the available data is a mistake you cannot risk making. According to a 2016 McKinsey & Company study, over the past three years, digital leaders have achieved revenue growth five times greater, an operating margin profit eight times greater, and a return to shareholder value two times higher than laggards. Companies today need a closed loop system that combines data, insight, and action. Download this paper to learn about the goals of a system of insight (SOI), the common set of technologies that all systems of insight need, and how an SOI can make a difference in your business.
Tags : 
    
TIBCO Software APAC
Published By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Trimble     Published Date: Aug 20, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: • Minimize costly errors before they destroy your profit margin • Retain the knowledge of your top estimators, even if they leave • Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: Forcepoint     Published Date: Aug 31, 2018
Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Aug 31, 2018
Eine Firma ist nur so handlungsfähig wie ihr Netzwerk. Änderungen an der Netzwerkarchitektur sind daher riskant. Verbesserungen an der Sicherheit eines IT-Netzwerkes bedeuten oft schlechtere Netzwerk-Performance und umgekehrt. Vor allem, wenn Netzwerke nicht konsistent sind und dadurch der Verwaltungsaufwand sehr hoch ist, sollte man über eine Neuplanung nachdenken. „Modernizing the Distributed Enterprise Network“ untersucht wie die Forcepoint NGFW neue Standards setzt und somit die Digitale Transformation in Unternehmen voranbringt. Enterprise-grade SD-WAN connectivity. Implementieren und Verwalten von Unternehmensnetzwerken mit mehr als 1000 Standorten zentral von einer Konsole. Höchste Sicherheit ohne Einbußen bei der Performance und Zuverlässigkeit. Einfachste Implementierung und Verwaltung mit zentralem Management im Unternehmen. Zukunftssicher, agil und flexibel. Passt sich unterschiedlichen Anforderungen und Situationen an. Lesen Sie „Modernizing the Distributed Enterpri
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.