risk

Results 1 - 25 of 2723Sort Results By: Published Date | Title | Company Name
Published By: Adlib Software     Published Date: Feb 09, 2018
In financial services, contracts often exist in highly dispersed formats, with jurisdictional complexities and risk aspects that change over time—resulting in high levels of risk. Learn how to transform contracts into actionable, defensible assets with a robust contract intelligence solution.
Tags : 
    
Adlib Software
Published By: SAP     Published Date: May 19, 2016
SAP® solutions for enterprise information management (EIM) support the critical abilities to architect, integrate, improve, manage, associate, and archive all information. By effectively managing enterprise information, your organization can improve its business outcomes. You can better understand and retain customers, work better with suppliers, achieve compliance while controlling risk, and provide internal transparency to drive operational and strategic decisions.
Tags : 
    
SAP
Published By: Experian     Published Date: Mar 30, 2017
Businesses today recognize the importance of the data they hold, but a general lack of trust in the quality of their data prevents them from achieving strategic business objectives. Nearly half of organizations globally say that a lack of trust in their data contributes to increased risk of non-compliance and regulatory penalties (52%) and a downturn in customer loyalty (51%). To be of value to organizations, data needs to be trustworthy. In this report, you will read about the findings from this unique study, including: · How data powers business opportunities · Why trusted data is essential for performance · Challenges that affect data quality · The current state of data management practices · Upcoming data-related projects in 2017
Tags : 
    
Experian
Published By: Reltio     Published Date: Feb 12, 2016
Reltio delivers reliable data, relevant insights and recommended actions so companies can be right faster. Reltio Cloud combines data-driven applications with modern data management for better planning, customer engagement and risk management. IT streamlines data management for a complete view across all sources and formats at scale, while sales, marketing and compliance teams use data-driven applications to predict, collaborate and respond to opportunities in real-time. Companies of all sizes, including leading Fortune 500 companies in healthcare and life sciences, distribution and retail rely on Reltio.
Tags : 
    
Reltio
Published By: Silwood Technology     Published Date: Mar 02, 2016
Ever since organisations started to implement packaged software solutions to solve business problems and streamline their processes there has been a need to access their data for the purposes of reporting and analytics, integration, governance, master data and more. Information Management projects such as these rely on data professionals being able to understand the underlying data models for these packages in order to be able to answer the critical question “Where’s the data?”. Without this knowledge it is impossible to ensure accuracy of data or timely delivery of projects. In addition the lack of discovery tools designed to meet this challenge has meant that performing this task has commonly been frustrating, time-consuming and fraught with risk. This white paper offers insight into why the traditional methods are not effective and how an innovative software product from Silwood Technology provides a faster and more effective approach to solving the problem.
Tags : 
    
Silwood Technology
Published By: Data Ninja     Published Date: Apr 16, 2017
By adding structure to free text using text analytics and graph databases, text becomes valuable business data. This paper examines a real life use case in risk analysis. Text is a part of all communication channels from social media, documents, logs, and data bases. In order to use the information from text, you need to extract the data in a way that provides useful information on entities, locations, organizations, and their properties. Graph databases are very powerful in showing the text relationships including the nearest neighbors, clusters, and the shortest paths. The combination of text analytics and graph databases can be used to solve business problems.
Tags : 
    
Data Ninja
Published By: Datawatch     Published Date: Apr 06, 2018
Enterprises are focusing on becoming ever more data-driven, meaning that it is simply unacceptable to allow data to go to waste. Yet, as the amount of data businesses collect and control continues to increase exponentially, many organizations are failing to derive enough business value from their data. Companies are feeling the pressure to extract maximum value from all of their data, both defensive and offensive. Defensive analytics are the “plumbing aspects” of data management that must be captured to mitigate risk and establish a basic understanding of business performance. Offensive analytics build on defensive analytics and support overarching business objectives, strategic initiatives and long-term goals using predictive models. In this whitepaper, you will learn how to address many challenges, including streamlining operational reporting, delivering insight and providing a single, unified platform for everyone.
Tags : 
    
Datawatch
Published By: BackOffice     Published Date: Apr 22, 2018
The success of a business is increasingly influenced by how effectively it utilizes data within strategic decision making & operations. But when a business views its critical data simply as a byproduct of business processes, and doesn’t value it as a business asset, it increases the risk of not being able to achieve its desired outcomes.
Tags : 
    
BackOffice
Published By: Workday APAC     Published Date: Dec 18, 2018
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
    
Workday APAC
Published By: Gigamon     Published Date: Dec 13, 2018
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
    
Gigamon
Published By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : 
social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, social media management software, social media marketing tools, social media monitoring tools, social media management company
    
Spredfast
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Forcepoint     Published Date: Dec 27, 2018
Helping agencies prepare and respond to this threat is a key reason GSA and DHS developed the Continuous Diagnostics and Mitigation (CDM) program in 2013. The program was designed to provide agencies with quick access to automated network monitoring and risk-assessment tools that are able to quickly prioritize and remediate security vulnerabilities. DHS is authorized to pay for the first two years of the program as an incentive for implementing CDM. Agencies are making progress, but as Kent’s statement suggests, there is still work to do.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Dec 27, 2018
Digital transformation has driven unprecedented connectivity throughout government agencies. Users want to work in dynamic applications that reside on premises, in the cloud or in a hybrid environment. They also expect to access data, including Controlled Unclassified Information (CUI), from anywhere - and from any type of device.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Dec 27, 2018
Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your agency and the primary source of security breaches driving cyber risk to all-time highs.
Tags : 
    
Forcepoint
Published By: Ahead     Published Date: Jan 10, 2019
A January 2018 commissioned study conducted by Forrester Consulting on behalf of ServiceNow How a Representative Organization Resolved Security Incidents 45% Faster This Forrester Study provides a framework and customer example to help readers evaluate the potential financial benefits of investing in ServiceNow Security Operations. To understand and illustrate the benefits, costs, and risks associated with ServiceNow, Forrester interviewed three current Security Operations customers to create a representative organization. This organization: Improved vulnerability response times by 25% Prioritized vulnerabilities 60% faster Achieved 230% ROI Download this study to evaluate the Total Economic Impact of using ServiceNow Security Operations to deliver fast and efficient security response.
Tags : 
    
Ahead
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept