• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

property risk

Results 1 - 20 of 20Sort Results By: Published Date | Title | Company Name
By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
By: RMS     Published Date: Jul 25, 2019
The insurance industry boasts some of the most sophisticated modeling capabilities in the world. And yet the average property underwriter does not have access to the kind of predictive tools that carriers use at a portfolio level to manage risk aggregation, streamline reinsurance buying and optimize capitalization.
Tags : 
    
RMS
By: Collaborative Consulting     Published Date: Dec 20, 2013
According to a McKinsey study, half of all outsourced projects failed to meet their expected goals – while an Information Week Survey showed that 40% of outsourced projects did not save money! Factors that contribute to these problems include issues with quality, time zone challenges, and added travel expenses, among others.
Tags : 
collaborative consulting, infographic, offshoring, real company costs, language issues, communication issues, property risk, security systems
    
Collaborative Consulting
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
By: E-SignLive by Silanis     Published Date: Jan 29, 2014
In property and casualty insurance, closing new business quickly is key. The longer you leave documents on the kitchen table for signature, the higher the risk of drop-off. Today, people are online. That’s where they want to do business, and they are rewarding carriers and agents who can provide a fast and convenient digital experience. This eBook shows you how P&C companies of all sizes are using electronic signature technology get documents securely signed online – on any mobile device or computer, from anywhere, in minutes.
Tags : 
silanis, e-signatures, electronic signatures, insurance, property, casualty, security, legality
    
E-SignLive by Silanis
By: SambaSaftey     Published Date: Mar 15, 2019
Regardless of the size of the vehicles, and often despite the utmost caution, operating vehicles can be a risky endeavor. According to the National Highway Transportation Safety Administration, highway accidents accounted for 37,461 deaths in the U.S. in 2016.1 Moreover, a recent study by Motus, a vehicle management and reimbursement platform, found that 40% of all motor vehicle accidents are work-related and cost employers a staggering $56.7 billion in 2017, taking into account medical expenses, property damage, increased insurance premiums, and lost productivity.2 While liability insurance is an important way for employers to address that risk, it’s by no means a panacea. Companies can and should be doing more to lessen the likelihood of accidents in the first place. And given that the vast majority (94%, according to NHTSA’s study) stem from driver-related actions or inactions as opposed to equipment malfunctions, one of the most important ways of doing so is to ensure that the in
Tags : 
    
SambaSaftey
By: Dell & Microsoft     Published Date: Aug 14, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell & Microsoft
By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management
    
IBM
By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
By: Dell     Published Date: Sep 12, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell
By: LogRhythm     Published Date: Aug 08, 2016
THE TIME HAS come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Tags : 
cyber threat, cyber risk, technology, best practices, security, business intelligence
    
LogRhythm
By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control
    
Logrhythm
By: Symantec.cloud     Published Date: Aug 10, 2010
With 75% of business intellectual property contained in email, efficiently managing this data can pose a major challenge. Learn how hosted email archiving reduces legal risks while improving employee productivity.
Tags : 
messagelabs, symantec hosted services, email archiving, employee productivity, compliance, productivity, workforce management software
    
Symantec.cloud
By: Intralinks     Published Date: Oct 03, 2013
For many companies, in particular in industries like pharmaceuticals, software development, or entertainment, their intellectual property is more valuable than any physical asset. And with the increasing need to collaborate with external business partners to accelerate product life cycles and enhance innovation, there is a greater risk for sensitive information to be compromised. In this 6-page white paper, discover the benefits of how the right inter-enterprise collaboration tool can ensure secure document sharing and team collaboration, and what to keep in mind as you look for a provider.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications
    
Intralinks
By: Eaton     Published Date: Jan 26, 2016
When working with data center and commercial facility electrical systems, shocks of 100mA to more than 2,000mA are possible—definitely in the realm of serious harm to humans and property. Energized electrical equipment also presents the risk of arc flash caused by electrical faults that produce powerful explosions. When dealing with commercial and industrial electrical systems, such as uninterruptible power systems (UPSs) and their batteries, data center and facilities managers need to be aware of these risks, especially since some repair and maintenance procedures require working with a unit that is still energized. There are ways to minimize the risks to employees, equipment and the field technician performing the service. This paper answers some common questions about UPS maintenance, how to reduce the risks associated with servicing UPSs and batteries, and how to qualify a UPS service provider.
Tags : 
eaton, ups safety, data center, arc flash, energized electrical equipment, facility managers, ups maintenance, it management
    
Eaton
By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
security, it management
    
CarbonBlack
By: Symantec     Published Date: Jun 19, 2015
Learn how employees are putting your intellectual property at risk and see how there is a growing problem of intellectual property theft in the workplace by understanding the mindset of employees that take corporate assets.
Tags : 
intellectual property, cyber criminals, sensitive data, security initiatives, security, enterprise applications
    
Symantec
By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening, human resource technology
    
HireRight
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter