Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

risk

Results 276 - 300 of 2635Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Aug 25, 2017
New seismic and disruptive events are upending the pace of innovation – and leading companies are jumping into the fray, trying to differentiate themselves through emerging business models. But here is the hard truth: Enterprises are wasting money, resources and time putting on a facade of innovation that falls short of customer and shareholder expectations. There is an inherent expectation that these incremental, and in many cases “siloed,” investments or initiatives will lead to sustained business impact. The time has come to move beyond “innovation theater” into a more mature adoption of innovation that drives measurable business results. Now is the time for Innovation 2.0.
Tags : 
corporate culture, accountable business, risk, leveraging market differentiators, portfolio, investments
    
IBM APAC
Published By: Intel Security     Published Date: May 15, 2015
Intel Security has produced a comprehensive guide to help you evaluate the risks and options for securing your business whichever path you choose.
Tags : 
windows server support, end of windows support, intel security, security
    
Intel Security
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Proofpoint
Published By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
Published By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
IBM APAC
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse this summary for additional information about performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers.
Tags : 
ibm uk, ibm, storwize v7000, storage, management, consolidation, virtualization, tiering, migration, backup, replication, non-disruptive, ssd, solid state, metro mirror, global mirror, raid, if award winner storwize v7000, ibm smarter planet, smarter technology
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment.
Tags : 
esg, virtualization, ibm, storwize v7000, storage, management, consolidation, virtualization, tiering, migration, backup, replication, non-disruptive, ssd, solid state, metro mirror, global mirror, raid, if award winner storwize v7000, ibm smarter planet
    
Ogilvy - IBM UK
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data, ibm
    
IBM APAC
Published By: Workday DACH     Published Date: Mar 08, 2018
The digital revolution is reshaping how business is being conducted. Companies are exploring new ways to use mobile, social, and other digital channels to connect with customers in the channels they prefer and to drive efficiencies in business and operational processes. A major challenge companies face in executing on digital strategies is determining which C-level executive is best positioned to drive the digital agenda. Research reflects that ownership is fractured across multiple C-level roles. Thanks to their technical acumen and their unique perspective across all facets of the business, the CIO is ideally positioned to navigate the digital journey. In this white paper by Workday and HMG Strategy, you will discover: • Examples of innovative techniques in digital business that are resulting in successful business transformation by industry leaders. • The key traits that are required by innovative CIOs to flourish, including a willingness to be risk-tolerant and apply courageous
Tags : 
    
Workday DACH
Published By: NetApp     Published Date: Jun 03, 2016
Flash success demands that critical questions be asked when choosing the right solution. Simplify your purchase cycle, lower costs and reduce the risk of technology acquisition. Download the Gartner report today.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Aug 26, 2016
In competitive business environments, speed is a key differentiator. IT organizations worldwide have realized significant value in transitioning from traditional disk to flash-based storage architectures, paving the path to making businesses more responsive and ultimately more competitive. Learn how to transform traditional IT with high-speed data delivery while reducing the costs and risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
    
Dell PC Lifecycle
Published By: Akamai     Published Date: Jun 04, 2010
Predictive analytics have been used by different industries for years to solve difficult problems that range from detecting credit card fraud to determining patient risk levels for medical conditions. It combines data mining and machine-learning technologies to create statistical models based on historical data. It then uses these models to predict future events. Extracting the power from the data requires powerful algorithms behind predictive analytics.
Tags : 
akamai, predictive, online advertising, tracking pixels, online shopping, in-market, site visitors, performance marketing
    
Akamai
Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity-as-a-service, authentication, authorization, open web, iam, saml, oauth, openid, scim, spml, xacml
    
NetIQ
Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.
Tags : 
technology, drivers, security, reduce risk, applications, online service, business, confidentiality
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: VMware     Published Date: Aug 23, 2011
This paper discusses the radical change in datacenter and IT processes brought about by virtualization and by the inception of a cloud or service led model for delivery of IT resources. Perceived risks and organizational hurdles are analyzed, and guidance is given for organizations as they move to the cloud.
Tags : 
vmware, cloud computing, virtualization, business agility, cloud adoption trends, server virtualization, vcloud, infrastructure, data center design and management
    
VMware
Published By: VMware     Published Date: Aug 23, 2011
This paper analyzes the benefits and drawbacks of outsourcing cloud services, examines the business benefits and risks, and provides the steps you should take for a successful implementation.
Tags : 
vmware, cloud computing, outsourcing cloud services, gartner, saas applications, data center outsourcing, hosting, infrastructure utility, cloud service implementation, infrastructure, data center design and management, data center
    
VMware
Published By: VMware     Published Date: Aug 23, 2011
This paper analyzes the benefits and drawbacks of outsourcing cloud services, examines the business benefits and risks, and provides the steps one should take for a successful implementation.
Tags : 
vmware, market pulse report, global cloud adoption trends, cloud computing, transformation, enterprise hybrid cloud, business agility, cios, business value, business application, virtualization, data center, infrastructure, quality of service, data center design and management
    
VMware
Published By: IBM     Published Date: Sep 22, 2011
This e-book offers tips and solutions to help you optimize infrastructure, boost development productivity and improve database administrator (DBA) efficiency. With intelligent actions and technologies, you can better manage and deliver the information your company needs-along with cost savings, risk reduction and increased performance-to drive smarter business outcomes.
Tags : 
ibm, data management, dba, productivity, infrastructure, development, productivity
    
IBM
Published By: IBM     Published Date: Sep 22, 2011
Help reduce operational costs and risk while improving accessibility of critical business data.
Tags : 
ibm, data delivery, risk reduction, cdc, soa, mdm, data management
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.