Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it risks

Results 1 - 25 of 757Sort Results By: Published Date | Title | Company Name
Published By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
Published By: Entrust Datacard     Published Date: Jul 23, 2019
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively. Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard
Published By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. “Legacy” manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: • Duplicate or inaccurate data • Clunky system performance • Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : 
erp, manufacturing, industry 4.0
    
Epicor
Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
Published By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP Business Objects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to provide the conclusions of this cost and benefit analysis.
Tags : 
    
SAP
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP BusinessObjects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to report cost and benefit findings
Tags : 
    
SAP
Published By: SAP     Published Date: Jul 23, 2018
Forrester Consulting conducted a Total Economic Impact (TEI) study to provide readers with a framework to evaluate the potential financial impact of SAP S/4HANA on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using SAP S/4HANA. Read the study to learn how Forrester concluded that SAP S/4HANA provides an ROI of 349%.
Tags : 
    
SAP
Published By: Lenovo UK     Published Date: Nov 07, 2018
The rise of mobility is causing IT teams everywhere a headache, with the potential for increased costs and risks. But with ThinkPad powered by Intel® Core™ i7 vPro™ processors, you get 360 security, reliable durability and uncompromised productivity in each and every device. Learn more in our white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity, mobility, lenovo x1, workforce mobility
    
Lenovo UK
Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Extracting value from data is central to the digital transformation required for businesses to succeed in the decades to come. Buried in data are insights that reveals what your customers need and how they want to receive it, how sales, manufacturing, distribution, and other aspects of business operations are functioning, what risks are arising to threaten the business, and more. That insight empowers your businesses to reach new customers, develop and deliver new products, to operate more efficiently and more effectively, and even to develop new business models. "
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Nov 13, 2017
The HX Data Platform uses a self-healing architecture that implements data replication for high availability, remediates hardware failures, and alerts your IT administrators so that problems can be resolved quickly and your business can continue to operate. Space-efficient, pointerbased snapshots facilitate backup operations, and native replication supports cross-site protection. Data-at-rest encryption protects data from security risks and threats. Integration with leading enterprise backup systems allows you to extend your preferred data protection tools to your hyperconverged environment.
Tags : 
hyperflex, systems, data platform, storage efficiency, business, cisco
    
Cisco EMEA
Published By: Coupa     Published Date: Dec 14, 2018
Many procurement departments are still using traditional manual processes or outdated technology. The result? Rogue spending, missed discounts from supplier contract pricing, reconciliation headaches, and the list goes on. These business risks are driving more organizations towards the cloud-based, secure, and workflow-friendly world of eProcurement solutions. These solutions are saving money and resources, improving use of budgets and personnel, enabling centralization, and using data to improve and streamline end-to-end purchasing processes. Download this report to learn about: Procurement trends from 400 organizations surveyed Operational and cost-savings benefits of eProcurement Leading features and functionality in eProcurement Adoption best practices and how to get started
Tags : 
    
Coupa
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
An optimized hybrid IT infrastructure enables innovative business outcomes—but rapid IT transformation also creates new risks, threats and vulnerabilities. Coupled with increasingly sophisticated cyberattacks and complex regulatory pressures, managing risk in today’s digital environment becomes even more critical to the enterprise. Download now to learn more.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Hybrid cloud drives innovation—but digital transformation introduces more potential threats and vulnerabilities. Build security in and address risks upfront with proven capabilities from HPE, a global authority in IT security.
Tags : 
    
Hewlett Packard Enterprise
Published By: Oracle     Published Date: Nov 28, 2017
Today’s leading-edge organizations differentiate themselves through analytics to further their competitive advantage by extracting value from all their data sources. Other companies are looking to become data-driven through the modernization of their data management deployments. These strategies do include challenges, such as the management of large growing volumes of data. Today’s digital world is already creating data at an explosive rate, and the next wave is on the horizon, driven by the emergence of IoT data sources. The physical data warehouses of the past were great for collecting data from across the enterprise for analysis, but the storage and compute resources needed to support them are not able to keep pace with the explosive growth. In addition, the manual cumbersome task of patch, update, upgrade poses risks to data due to human errors. To reduce risks, costs, complexity, and time to value, many organizations are taking their data warehouses to the cloud. Whether hosted lo
Tags : 
    
Oracle
Published By: Cisco     Published Date: Jun 22, 2015
Read this paper to find out how the Cisco and Microsoft data center solutions provide your IT infrastructure with the flexibility and agility needed to address your changing business needs and achieve your business goals.
Tags : 
cisco and microsoft data center, it infrastructure, security risks, data center, data center solutions
    
Cisco
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
To support business continuity, many organizations eagerly avoid putting all their eggs in one basket. Understanding the critical role of last-mile connectivity and always-available Internet access, savvy firms utilize redundant wide area network (WAN) and Internet connections from multiple service providers to ensure network availability in addition to load balancing. Despite the good intentions, their Internet connectivity risks may still be in a single basket. That is because internet service providers (ISPs) and competitive local exchange carriers (CLECs) may operate using leased network infrastructure from the same incumbent local exchange carrier (ILEC).
Tags : 
    
Spectrum Enterprise
Published By: Epicor     Published Date: Aug 30, 2018
Does your current software give your lawn and garden business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful lawn and garden retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insuff
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software, lawn and garden pos, nursery retail software, garden center retail software, garden retailers pos, garden retail software
    
Epicor
Published By: Epicor     Published Date: Aug 30, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor
Published By: ADP     Published Date: Jun 01, 2018
The Marcus Buckingham Company, an ADP Company, commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying StandOut. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of StandOut on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed several customers with experience using StandOut. StandOut is an integrated suite that pairs a technology platform with coaching to help organizations achieve their talent activation goals. Prior to using StandOut, the interviewed organizations did not have a structured program to improve and measure employee engagement and performance. Organizations used annual surveys and annual performance reviews, and some even encouraged weekly check-ins, but there was no guidance on how to complete these tasks, and the data t
Tags : 
    
ADP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.