• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

corporate risk

Results 1 - 25 of 82Sort Results By: Published Date | Title | Company Name
By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, security
    
Attachmate
By: C2C Systems     Published Date: Apr 24, 2013
Download this white paper to see how PST Enterprise enables corporate IT to regain control of distributed corporate email found in PST files to manage compliance, support discovery and minimize risk associated with this data. It enables full discovery of all PST files, regardless of their location or status, and it provides the information needed to take intelligent action on the data within. Such actions include owner determination, in-place retention, data migration, and file copy, move, disconnect and deletion.
Tags : 
pst enterprise, files, emails, data migration, file copy, distribution
    
C2C Systems
By: C2C Systems, Inc.     Published Date: Mar 15, 2007
As the need to retain corporate data has increased to meet regulatory requirements-- and best practice may dictate email meeting certain internal policies-- the very existence of PSTs is putting email more and more "at risk. So what can you do about PSTs?
Tags : 
im and email archiving, im archive, email archive, email security, data management, enterprise email, personal email, email archiving, c2c, pst, outlook, mailbox, storage, messaging
    
C2C Systems, Inc.
By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : 
talent risks, talent issues, talent management, development roi
    
CEB
By: CEB     Published Date: May 19, 2014
Establishing compliance training requirements has always been difficult, but given recent changes to the regulatory and corporate work environments, the costs of failure are now more significant. To help companies get their training curricula right, CEB created a step-by-step guide to building a truly effective compliance training curriculum: one that reduces risk.
Tags : 
ceb, risk based compliance, training, reduce risk, regulatory changes, corporate work environments
    
CEB
By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
By: Cisco     Published Date: Dec 27, 2017
Among your primary responsibilities as a board member is providing advice on both business strategy and enterprise risk. A general understanding of risk management is essential when looking at cyber risk specifically. Ultimately, an enterprise should consider adding cybersecurity expertise to its board membership, but all members can benefit from increasing their understanding about how cyber risk affects corporate strategy and the overall enterprise risk profile. To provide effective strategic advice to company leadership on cyber risk, you must ask the right questions, including whether a company does ongoing cyber risk assessment and management, and how.
Tags : 
    
Cisco
By: Cisco     Published Date: Dec 27, 2017
New disruptive digital technologies are changing the face of workplace as well as worker expectations. The rapidly evolving 21st-century workforce is becoming increasingly mobile, contract-based, and technology savvy. Corporate real estate, IT, and HR leaders need to improve their work environments to suit these evolving needs, or they risk losing their employees to competition. This paper: • Discusses why your employees are disengaged • Discusses the six trends that will dominate the workforce of the future • Describes how Cisco® Workforce Experience solutions can help enable these rich workforce experiences
Tags : 
    
Cisco
By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, it management, storage, best practices
    
Commvault
By: Dell EMC     Published Date: Feb 23, 2017
Business leaders are increasingly looking to IT to deliver a mobile workspace that allows employees to access corporate data, applications, and communication resources on their devices of choice. But making the most of the opportunity while minimizing risks can be complex and overwhelming for many IT teams. Therefore, it makes more sense than ever for IT leaders to consider virtual client computing (VCC), also commonly referred to as virtual desktop infrastructure (VDI) solutions.
Tags : 
    
Dell EMC
By: DocuSign     Published Date: Apr 24, 2018
Moreover, more than half of Fortune 500 pharmaceutical and medical device companies are operating under corporate integrity agreements (CIA) with the U.S. government to mitigate the risks.
Tags : 
    
DocuSign
By: Dun & Bradstreet     Published Date: Oct 21, 2016
Companies are looking to their CFOs for strong leadership in developing corporate strategies and achieving growth. CFOs can meet these rising expectations by leveraging their knowledge of corporate data to extract valuable insights about customers, suppliers, partners and other stakeholders. Supported by analytics, CFOs can help their companies create a global, unified and clear view of their many relationships with customers and others to guide intelligent risk-taking and thoughtful investment—both necessary catalysts for growth. This capability will also enable the company, particularly its sales and marketing functions, to move faster and adapt more quickly to changing conditions. The 21st-century CFO is not only concerned with controlling costs and minimizing risk, but also with maximizing opportunities and generating growth. The right foundational technologies and organizational processes for data-driven decision making can help them achieve all of these strategic goals.
Tags : 
    
Dun & Bradstreet
By: Emulex Corporation     Published Date: Nov 07, 2013
An intelligent, searchable recording fabric with 100% accuracy sounds pretty useful. But can you calculate a solid ROI to justify it? We all know intuitively that there are substantial bottomline benefits to reducing unplanned network downtime and improving the management of corporate risk. It follows that it also pays dividends to free up highly skilled Tier 1 and Tier 2 engineers to handle resolving the most difficult and costly network issues while using less expensive personnel to handle easier ones. But justifying a network investment on a soft, intuitive argument like this alone doesn’t usually suffice. And, depending on what industry you are in, the cost savings potential will vary. At the high end, in many financial and brokerage institutions, a minute of downtime can cost the company millions of dollars. So being able to shave even a single minute off network downtime with a pervasive monitoring tool represents an immediate recovery of the fabric investment.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation
By: Emulex Corporation     Published Date: Nov 07, 2013
An intelligent, searchable network monitoring fabric with 100% accuracy sounds pretty useful. But can you calculate a solid ROI to justify it? We all know intuitively that there are substantial bottomline benefits to reducing unplanned network downtime and improving the management of corporate risk. It follows that it also pays dividends to free up highly skilled Tier 1 and Tier2 engineers to resolve the most difficult and costly network issues. That way, you can use less expensive personnel to handle the more common, numerous, and easily resolvable problems. But justifying a network investment using soft, intuitive arguments like these alone often doesn’t suffice in an economic climate where budgets are closely guarded and business cases for procurements are mandatory. And depending on what industry you are in, the cost savings potential and payback will vary. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation
By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software
By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting, laptop, data, endpoint, corporate, risk, regulatory, financial, exposure, security, policies, backup and recovery, storage, compliance, disaster recovery, business intelligence
    
EVault Inc.
By: F5 Networks Inc     Published Date: Dec 08, 2017
In today’s digital marketplace, your applications are your business. They fuel innovation and are the driving force for staying competitive in an always-on, always-connected world. Apps are the way you build relationships with your customers, empower your employees, facilitate growth, and so much more.
Tags : 
cloud risk, application safety, corporate data risk
    
F5 Networks Inc
By: First Advantage     Published Date: Apr 30, 2018
Screening your company’s existing workforce can be a critical component in your overall security plan. But the process is far from simple—and is often intimidating. Learn from one company that has navigated the complexities, and consider their strategies to help you plan the process. Pre-employment background screening is now considered a standard practice in Corporate America. Very few companies, however, are crossing the threshold to conduct screens on their existing workforce. It’s a complex endeavor, and to be successful, companies need to walk a fine line between addressing legitimate business and security risks and not alienating employees along the way.
Tags : 
    
First Advantage
By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv
By: FTI Consulting     Published Date: Mar 03, 2017
2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.
Tags : 
fti, fti consulting, crisis management, corporate risk, cyber attacks, political disruption, corporate crisis, business continuity, security policies, best practices, risk management, project management, vulnerability management
    
FTI Consulting
By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : 
social intelligence, marketing, social media, gleanster
    
Gleanster
By: Good Technology Corporation     Published Date: Apr 29, 2013
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring security risks. You need a mobile app security strategy to navigate the challenge. Read this guide to learn the top 10 must-haves as you build yours.
Tags : 
mobile applications, mobile security, mobile application management, mobile app security, secure mobile application, enterprise mobile applications
    
Good Technology Corporation
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter