• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

risk mitigation

Results 1 - 25 of 91Sort Results By: Published Date | Title | Company Name
By: Arbor     Published Date: Sep 15, 2014
This Frost and Sullivan market research study comes at a time when DDoS attacks are accelerating in size, frequency and complexity. Though DDoS is not a new concern, the risk of DDoS attacks and the potential for damage is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.
Tags : 
ddos attacks, it security, ddos mitigation, security, it management, business analytics
    
Arbor
By: Arbor     Published Date: Sep 15, 2014
Die Erhöhung von DDoS-Angriffen kurbelt die Nachfrage an umfassenden Lösungen an “This market engineering study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attack probability and potential for damages is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.”
Tags : 
market engineering, ddos attacks, it security, application security, ddos, firewalls, hacker detection, security management
    
Arbor
By: BitSight Technologies     Published Date: Feb 03, 2015
In this white paper, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Tags : 
security ratings, it risk mitigation, cyber risk, performance metrics, network security risk, security, it management, knowledge management
    
BitSight Technologies
By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine
By: Blue Coat Systems     Published Date: Aug 07, 2012
For anywhere, anytime, any-device mobile engagement, implementing a stateless architecture calls for building protection in the application layer, moving from device management to risk-based device inspection, performing real-time threat detection and mitigation, and leveraging cloud technologies.
Tags : 
mobility, it security, security & risk, s&r, infrastructure operations, i&o, devices, augmented reality
    
Blue Coat Systems
By: Brandwatch     Published Date: Jul 18, 2013
Brandwatch analyzed five retail brands to demonstrate the many ways a business can benefit from social media beyond just marketing: Kmart, Target, H&M & Zappos analyzed; Six different use-cases illustrated; Multiple markets and languages covered.
Tags : 
social media, retail, pr risk mitigation
    
Brandwatch
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics
    
CA Technologies
By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : 
carbonite, doubletake, risk mitigation
    
Carbonite
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Ransomware is the fastest growing malware threat today. Utilize these security best practices and risk mitigation strategies to improve your overall security posture. Discover how to: • Reduce risk of ransomware • Get immediate protection against attacks • Prevent malware from spreading laterally To find out how to keep your business protected, we recommend Ransomware Defense For Dummies.
Tags : 
    
Cisco Umbrella EMEA
By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management
    
Citrix Systems
By: Dell     Published Date: Feb 04, 2015
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores Windows Server migration options, hardware/software replacements, and support services to help customers tackle a modernization effort. It also evaluates the benefits that customers can enjoy, thanks to a move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : 
dell, windows, microsoft, modernization, risk, management, modernization, idc
    
Dell
By: DMD Systems Recovery     Published Date: Dec 02, 2016
The purpose of ITAD is to ensure that every possible step is taken to protect the reputation of your brand while also maximizing your return on investment.
Tags : 
dmd systems, it asset disposal, itad, electronic waste, migration, server virtualization, productivity, power and cooling
    
DMD Systems Recovery
By: DocuSign UK     Published Date: Nov 06, 2018
"In today’s intensely competitive marketplace, the business world is moving rapidly to online transactions from inefficient, costly, paper-based processes. Furthermore, consumers expect to be able to interact digitally anytime, anyplace, so providing easily accessible digital touchpoints is also critical to successfully keeping and retaining your customers. No matter the size or type of business you’re in, you want to save money and increase revenue. And you want to make it all easy. Electronic signatures are a powerful way to accomplish all that. Read the report to learn how leading companies across industries are improving critical business processes using eSignatures to achieve: - Greater customer satisfaction - Higher close rates and productivity - Lower costs, greater efficiency - Improved time to revenue - Compliance and security-risk mitigation"
Tags : 
    
DocuSign UK
By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva
By: FICO     Published Date: Mar 22, 2018
Predictive analytics provide the foresight to understand cybersecurity risk exposure. Cybersecurity strategies often consist of “whack-a-mole” exercises focused on the perpetual detection and mitigation of vulnerabilities. As a result, organizations must re-think the ever-escalating costs associated with vulnerability management. After all, the daily flow of cybersecurity incidents and publicized data breaches, across all industries, calls into question the feasibility of achieving and maintaining a fully effective defense. The time is right to review the risk management and risk quantifcation methods applied in other disciplines to determine their applicability to cybersecurity. Security scoring is a hot topic, and rightfully so. When evaluating ways to integrate these scores into your cybersecurity strategy, be sure to look for an empirical approach to model development. The FICO Enterprise Security Score is the most accurate, predictive security score on the market.
Tags : 
    
FICO
By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : 
mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid
    
Fiserv
By: Forcepoint     Published Date: Apr 19, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application, anti spam, anti spyware, anti virus
    
Forcepoint
By: FORTRUST     Published Date: Aug 14, 2015
This white paper examines several key criteria as they relate to service delivery from a data center or colocation provider.
Tags : 
fortrust, data center, colocation, service management, risk mitigation, remote access, servers, blade servers
    
FORTRUST
By: Great Bay Software     Published Date: Jan 24, 2018
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
iot, security, security systems, iot deployments
    
Great Bay Software
By: Great Bay Software     Published Date: Apr 12, 2018
"Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!"
Tags : 
    
Great Bay Software
By: Great Bay Software     Published Date: Jul 16, 2018
"Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!"
Tags : 
    
Great Bay Software
By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
By: Hitachi Vantara     Published Date: May 10, 2018
Digitizing communications governance is critical as banks adopt next-generation automation and RegTech solutions to address compliance and risk-mitigation measures. Regulations are changing risk profiles, requiring oversight of the culture of risk-taking, and preventing market abuse. Hitachi Vantara solutions enable you to centrally “capture, curate, consume” all regulated employee communications across the front office, middle office and back office.
Tags : 
    
Hitachi Vantara
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter